YoVDO

Pangu 9 Internals

Offered By: Black Hat via YouTube

Tags

Black Hat Courses iOS Security Courses Jailbreaking Courses Arbitrary Code Execution Courses

Course Description

Overview

Explore the inner workings of the Pangu 9 untethered jailbreak tool for iOS 9 in this 47-minute Black Hat conference talk. Delve into the sequence of vulnerabilities exploited in the iOS userland to achieve arbitrary code execution in the kernel and persistent code signing bypass. Discover the logical error in a system service that allows container apps to gain arbitrary file read/write privileges. Learn how Pangu 9 leverages the system debugging feature to execute code outside the sandbox. Examine the vulnerability in the dyld_shared_cache file loading process that enables persistent code signing bypass. Investigate the backup-restore process vulnerability that permits execution of apps signed by revoked enterprise certificates without user approval. Gain insights into iOS jailbreaking techniques, dynamic libraries, TeamID validation, and kernel patching through this comprehensive exploration of iOS security vulnerabilities and exploitation methods.

Syllabus

Introduction
Outline
About us
iOS
Jailbreak
Tradeoff
Dynamic Libraries
TeamID Validation
AnyAgent
iOS 83
Challenges
Userland
XP
API
Entitlement
Fortisbox
Pangu Agent
Jailbreak iOS 91
Jailbreak iOS 93
Kernel Patch
Sandbox Extension
Debugger
Attacks
Code Audit
Shared Cache
Kernel
Conclusion


Taught by

Black Hat

Related Courses

The Great Escape of ESXi
media.ccc.de via YouTube
Android Parcels - The Bad, the Good and the Better - Introducing Android's Safer Parcel
Black Hat via YouTube
Arbitrary Code Execution on RISC-V Using Fault Injection
nullcon via YouTube
Back to the Epilogue - How to Evade Windows' Control Flow Guard with Less than 16 Bytes
Black Hat via YouTube
iOS Kernel Heap Armageddon Revisited
Black Hat via YouTube