31.12.2012 Views

Targeting the iOS Kernel - Reverse Engineering Mac OS X

Targeting the iOS Kernel - Reverse Engineering Mac OS X

Targeting the iOS Kernel - Reverse Engineering Mac OS X

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attacking from User Space - Syscalls<br />

• syscalls are directly callable from user space<br />

• for all <strong>OS</strong> X syscalls source code is available<br />

• however <strong>i<strong>OS</strong></strong> has 8 additional syscalls<br />

• after syscall table is found syscall handlers can be audited<br />

Stefan Esser • <strong>Targeting</strong> <strong>the</strong> <strong>i<strong>OS</strong></strong> <strong>Kernel</strong> • April 2011 •<br />

40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!