YoVDO

Debug for Bug - Crack and Hack Apple Core by Itself

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Vulnerability Analysis Courses

Course Description

Overview

Explore a comprehensive analysis of Apple's core vulnerabilities in this 43-minute Black Hat conference talk. Dive into the fuzzing methodology that uncovered dozens of security flaws, including double free and out-of-bounds read/write issues. Learn about the detailed examination of 10 specific vulnerabilities, with the promise of more to come. Gain insights into debugging and fuzzing the Apple kernel using LLDB scripts, covering topics such as the debug loop, DBFast, Probus, control logic, fast mutation, data generation, rebooting, graphic equations, memory operations, and connection types. Witness a live demonstration and discover the potential for both fun and profit in uncovering Apple's core weaknesses.

Syllabus

Introduction
Debug Loop
DBFast
Probus
Control Logic
Fast Mutation
Data Generation
Rebooting
Graphic Equations
Memory Operations
Connection Types
Demo
TestTo
Titi
Value
Conclusion


Taught by

Black Hat

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight