Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Secti<strong>on</strong> 2: Exploitati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> KASLR by <str<strong>on</strong>g>Pegasus</str<strong>on</strong>g><br />
Stage Two <str<strong>on</strong>g>of</str<strong>on</strong>g> Infecti<strong>on</strong>: Kernel Locati<strong>on</strong> Disclosure<br />
Once <str<strong>on</strong>g>the</str<strong>on</strong>g> attack is launched in <str<strong>on</strong>g>the</str<strong>on</strong>g> first stage, <str<strong>on</strong>g>the</str<strong>on</strong>g> sec<strong>on</strong>d stage exploits a<br />
kernel informati<strong>on</strong> leak (CVE-2016-4655). This prepares <str<strong>on</strong>g>the</str<strong>on</strong>g> device for <str<strong>on</strong>g>the</str<strong>on</strong>g><br />
kernel memory corrupti<strong>on</strong> (CVE-2016-4656) that ultimately leads to jailbreak.<br />
Page 11