YoVDO

Machswap - Stephen Parkinson

Offered By: White Hat Cal Poly via YouTube

Tags

iOS Security Courses Garbage Collection Courses Jailbreaking Courses Kernel Vulnerabilities Courses

Course Description

Overview

Explore the inner workings of iOS jailbreaking in this 28-minute talk by Stephen Parkinson from White Hat Cal Poly. Dive deep into the machswap vulnerability that enabled kernel access for iOS 12 jailbreak developers. Learn about crucial components like XUMO, Mailbox, MIG, and Afterfree. Understand the roles of Garbage Collection, Fake Port Spray, and Mock Vouchers in the jailbreaking process. Examine advanced concepts such as ThreadGetThreadForTask, SLR, Kernel Task Board, and VMmap. Gain insights into the TIP receiver and the final steps of creating a jailbreak. Perfect for those interested in iOS security, vulnerability research, and the technical aspects of mobile device exploitation.

Syllabus

Introduction
Overview
Last quarter
XU
MOC
Mailbox
MIG
MIG code
Afterfree
De Ville
Garbage Collection
FakePort
Spray
Get Mock Voucher
Fake Port
ThreadGet
ThreadForTask
SLR
Kernel Task Board
VMmapT
IP receiver
Jailbreak
Conclusion


Taught by

White Hat Cal Poly

Related Courses

Adaptive Android Kernel Live Patching
Hack In The Box Security Conference via YouTube
Razzer - Finding Kernel Race Bugs through Fuzzing
IEEE via YouTube
Monitoring Surveillance Vendors - A Deep Dive into In-the-Wild Android Full Chains in 2021
Black Hat via YouTube
Escaping Virtualized Containers
Black Hat via YouTube
Jailbreaks Never Die - Exploiting iOS 13.7
Hack In The Box Security Conference via YouTube