YoVDO

Machswap - Stephen Parkinson

Offered By: White Hat Cal Poly via YouTube

Tags

iOS Security Courses Garbage Collection Courses Jailbreaking Courses Kernel Vulnerabilities Courses

Course Description

Overview

Explore the inner workings of iOS jailbreaking in this 28-minute talk by Stephen Parkinson from White Hat Cal Poly. Dive deep into the machswap vulnerability that enabled kernel access for iOS 12 jailbreak developers. Learn about crucial components like XUMO, Mailbox, MIG, and Afterfree. Understand the roles of Garbage Collection, Fake Port Spray, and Mock Vouchers in the jailbreaking process. Examine advanced concepts such as ThreadGetThreadForTask, SLR, Kernel Task Board, and VMmap. Gain insights into the TIP receiver and the final steps of creating a jailbreak. Perfect for those interested in iOS security, vulnerability research, and the technical aspects of mobile device exploitation.

Syllabus

Introduction
Overview
Last quarter
XU
MOC
Mailbox
MIG
MIG code
Afterfree
De Ville
Garbage Collection
FakePort
Spray
Get Mock Voucher
Fake Port
ThreadGet
ThreadForTask
SLR
Kernel Task Board
VMmapT
IP receiver
Jailbreak
Conclusion


Taught by

White Hat Cal Poly

Related Courses

Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning
Learning Mobile Device Security
LinkedIn Learning
Supporting Face ID and Touch ID Authentication in iOS Using Swift 5
Pluralsight
CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent
Ethical Hacking: Hacking Mobile Platforms
Pluralsight