Targeting the iOS Kernel - Reverse Engineering Mac OS X

Targeting the iOS Kernel - Reverse Engineering Mac OS X Targeting the iOS Kernel - Reverse Engineering Mac OS X

reverse.put.as
from reverse.put.as More from this publisher
31.12.2012 Views

Who am I? Stefan Esser • from Cologne/Germany • Information Security since 1998 • PHP Core Developer since 2001 • Suhosin / Hardened-PHP 2004 • Month of PHP Bugs 2007 / Month of PHP Security 2010 • ASLR for jailbroken iPhones 2010 / untethered jailbreak for iOS 4.3.1/2 • Head of Research & Development at SektionEins GmbH Stefan Esser • Targeting the iOS Kernel • April 2011 • 2

Motivation • iPhone security heavily relies on kernel level protections • code signing / sandboxing • NX / ASLR • public iPhone exploit payloads are very limited in what they can do • security researchers have relied on the jailbreakers to provide kernel pwnage • this session is an introduction to finding bugs in the iOS kernel Stefan Esser • Targeting the iOS Kernel • April 2011 • 3

Motivation<br />

• iPhone security heavily relies on kernel level protections<br />

• code signing / sandboxing<br />

• NX / ASLR<br />

• public iPhone exploit payloads are very limited in what <strong>the</strong>y can do<br />

• security researchers have relied on <strong>the</strong> jailbreakers to provide kernel pwnage<br />

• this session is an introduction to finding bugs in <strong>the</strong> <strong>i<strong>OS</strong></strong> kernel<br />

Stefan Esser • <strong>Targeting</strong> <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> • April 2011 •<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!