19.11.2016 Views

Technical Analysis of the Pegasus Exploits on iOS

eNQc3Ry

eNQc3Ry

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Secti<strong>on</strong> 3: Privilege Escalati<strong>on</strong> and Activating <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

Jailbreak Binary<br />

This secti<strong>on</strong> covers <str<strong>on</strong>g>the</str<strong>on</strong>g> final steps carried out in Stage 2 to gain root access <strong>on</strong><br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> iPh<strong>on</strong>e, disable code signing, <str<strong>on</strong>g>the</str<strong>on</strong>g>n drop and activate <str<strong>on</strong>g>the</str<strong>on</strong>g> jailbreak binary. This<br />

stage leverages <str<strong>on</strong>g>the</str<strong>on</strong>g> final Trident vulnerability, where kernel memory corrupti<strong>on</strong><br />

leads to jailbreak (CVE-2016-4656).<br />

Page 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!