Главная
Study mode:
on
1
Introduction
2
Apple is rich on fail
3
Jailbreak persistency
4
Bug fixes
5
New tricks
6
Launch Demon
7
New Chain
8
Apples Mistake
9
Pangu Mistake
10
Apple Fixes
11
Pangu Jailbreak
12
Taiji Jailbreak
13
Exploit
14
Historical Perspective
15
Patient Alpha
16
What is incomplete code signing
17
Time of use
18
The trick
19
Apples fixes
20
Apples fix
21
Macports
22
iOS 6 Fix
23
Fun Fact
24
iOS 8 Update
25
Text Request
26
Mock API Call
27
Get Loaded Text Info
28
What you get back
29
iOS 6 20
30
Macro
31
Jailbreak made in China
32
Western Jailbreakers
33
Conclusions
Description:
Explore the vulnerabilities and security challenges in iOS 6, 7, and 8 through this 49-minute conference talk from SyScan'15 Singapore. Delve into jailbreak persistence techniques, bug fixes, and new exploits. Examine Apple's mistakes, Pangu and Taiji jailbreaks, and the historical perspective of iOS security. Learn about incomplete code signing, time-of-use vulnerabilities, and Apple's attempts to patch these issues. Discover the differences between jailbreaks made in China and those by Western developers. Gain insights into iOS security through practical examples, including mock API calls and text request analysis, providing a comprehensive overview of iOS security failures and their implications.

iOS 678 Security - A Study in Fail

SyScan360
Add to list