Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Dive into Apple IO80211FamilyV2

Black Hat via YouTube

Overview

Explore the architecture, attack surface, and vulnerabilities of Apple's IO80211FamilyV2 Wi-Fi client drivers in this 40-minute Black Hat conference talk. Delve into the refactored design introduced in macOS Catalina Beta, examining its integration with AppleBCMWLANCore and expanded features like Sidecar and Skywalk. Analyze recent vulnerability cases through reverse engineering, uncovering root causes and potential risks. Learn about Apple's SDK, WiFi fuzzing techniques, and the implications for iOS security. Gain valuable insights into the latest developments in Apple's wireless communication infrastructure and the associated cybersecurity challenges.

Syllabus

Introduction
Architecture
Attack Surface
Latest Vulnerability Cases
Reverse Engineering
Root Cause
Apple SDK
Long story short
Vulnerability
New vulnerabilities
WiFi fuzzer
Does this affect iOS
Summary
Times up

Taught by

Black Hat

Reviews

Start your review of Dive into Apple IO80211FamilyV2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.