Completed
Look for unprotected control flow transfer points
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attacking iPhone XS Max
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Outline
- 3 Unix Domain Socket
- 4 Race Condition
- 5 The fix
- 6 The pattern
- 7 UAF, let's look at the USE
- 8 Binary version may be better
- 9 PAC (Pointer Authentication Code)
- 10 UAF, let's look at the second USE
- 11 Got troubles while adding trust caches
- 12 tfpo's write capability for kernel image
- 13 Look for unprotected control flow transfer points
- 14 What can we do
- 15 Got ssh on iPhone XS Max
- 16 Black Hat Sound Bytes