19.11.2016 Views

Technical Analysis of the Pegasus Exploits on iOS

eNQc3Ry

eNQc3Ry

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Secti<strong>on</strong> 2: Exploitati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> KASLR by <str<strong>on</strong>g>Pegasus</str<strong>on</strong>g><br />

Stage Two <str<strong>on</strong>g>of</str<strong>on</strong>g> Infecti<strong>on</strong>: Kernel Locati<strong>on</strong> Disclosure<br />

Once <str<strong>on</strong>g>the</str<strong>on</strong>g> attack is launched in <str<strong>on</strong>g>the</str<strong>on</strong>g> first stage, <str<strong>on</strong>g>the</str<strong>on</strong>g> sec<strong>on</strong>d stage exploits a<br />

kernel informati<strong>on</strong> leak (CVE-2016-4655). This prepares <str<strong>on</strong>g>the</str<strong>on</strong>g> device for <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

kernel memory corrupti<strong>on</strong> (CVE-2016-4656) that ultimately leads to jailbreak.<br />

Page 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!