YoVDO

When Wireless Malware Stays on After Turning Off the Phone

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Hardware Security Courses Mobile Device Security Courses

Course Description

Overview

Explore the security implications of wireless chips remaining active in modern iPhones after power-off. Delve into the implementation of Find My advertisements and Digital Car Key 3.0 express mode, which operate even during low-power shutdown. Examine the hardware design of iPhone 11 and later models, and investigate the Bluetooth firmware in iPhone 12 and 13. Learn about modifying Bluetooth firmware and the InternalBlue framework for analysis, debugging, and potential malware installation. Discover techniques for matching important handlers in the latest firmware and understand the capabilities that could be exploited by malicious actors. Gain insights into the risks faced by high-value targets who can no longer trust their iPhones to be completely switched off.

Syllabus

Recon 2022 - When Wireless Malware Stays on after Turning off the phone


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube