Conference logo

iOS kernel exploitation archaeology - argp

34c3 - Security - 12/27/2017

This talk presents the technical details and the process of reverse engineering and re-implementation of the evasi0n7 jailbreak's main kernel exploit. This work was done in late 2013, early 2014 (hence the "archaeology" in the title), however, it will provide insight into the kernel debugging setup for iOS devices (iDevices), the encountered difficulties and how they were overcome, all of which can be useful for current iOS kernel vulnerability research.

Share this talk:
https://c3stream.de/Info?guid=55f921ed-ab90-4553-9903-8658557ac447