Главная
Study mode:
on
1
Intro
2
Previous Research
3
Motivation Of Basic Information Extraction
4
Vtable Characteristic
5
MetaClass Layout
6
Functionality Provided by KEXT
7
Overwritten virtual methods symbolization
8
Example
9
Detail Steps
10
Retrieve Client Name
11
Extracting IOExternal Method Dispatch
12
Complemental Mechanism
13
Carrier
14
Fuzzing Application's Architecture
15
Fuzzing Elements
16
Unavailable interfaces Identification
17
Setup
18
Vulnerability Case #1
Description:
Explore an advanced approach to optimizing IOKit fuzzing in iOS through a Black Hat conference talk. Delve into techniques for dynamically resolving symbols and parameter information using a kernel patch, overcoming the challenges posed by symbol hiding since iOS 7. Learn how to build an efficient fuzzing framework that generates inputs capable of passing basic parameter checks in IOKit interfaces. Discover methods for extracting valuable information from IOKit, including standard parameters and supplementary data. Examine the talk's coverage of vtable characteristics, metaclass layout, and KEXT functionality. Gain insights into client name retrieval, IOExternal Method Dispatch extraction, and complemental mechanisms. Study the architecture of a carrier fuzzing application and its key elements. Conclude with a real-world vulnerability case study, demonstrating the effectiveness of this optimized fuzzing approach for uncovering IOKit vulnerabilities in iOS.

Optimized Fuzzing IOKit in iOS

Black Hat
Add to list