Completed
User Client External Methods - Graceful
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Researching New Attack Interfaces on iOS and OSX
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Solution Overview
- 3 Attack Surfaces
- 4 Think about Apple System
- 5 New Attack Interfaces Generator
- 6 KEXTs Interfaces Analysis Flow
- 7 Classes inheritance relationship
- 8 Class/Method names re-fine
- 9 Connection Type - User Clients
- 10 User Client External Methods - Graceful
- 11 User Client External Methods - Ugly
- 12 Parse the External Method Dispatch Array
- 13 Analyze the ASM Instructions
- 14 Custom KEXT Analysis Engine
- 15 Generate CFG local information
- 16 Analyze key paths based on CFG
- 17 Emulate key instructions operation
- 18 Emulate register operation
- 19 Output User Client or external method information
- 20 Kernel Interfaces
- 21 Kernel Diff Methodology
- 22 Kernel Diff Analysis Practice (1/2)
- 23 KEXTs Diff Analysis
- 24 Disadvantages about KEXTs static analysis
- 25 Comparison of dynamic trace
- 26 Frida Hook in User Mode
- 27 xpe_connection_send_message API context
- 28 xpe_connection send message API context
- 29 Hunt more dynamic relation if you like
- 30 Dtrace introduction
- 31 Dtrace providers list
- 32 Dtrace seript (e.g. file probe)
- 33 Enhanced kernel fuzz
- 34 KASAN in iOS/OSX Kernel
- 35 Future plan
- 36 CVE-2018-4462 - Root Cause
- 37 OOB read in AMD Radeon X4000 Extension
- 38 OOB read-Root Cause
- 39 Over Flow-Root Cause
- 40 NULL PAGE Reference in Intel Accelerator
- 41 NULL PAGE Reference - Root Cause
- 42 Divide Zero in AMD Radeon X4000 Extension
- 43 Divide Zero - Root Cause