Overview
Explore the intricacies of iOS sandbox escape techniques in this HITB Security Conference talk. Delve into the world of mach message IPC and poorly designed daemons, uncovering vulnerabilities that allow arbitrary code execution outside the sandbox. Learn about research tools for analyzing mach message handlers and gain insights into exploiting vulnerabilities across various iOS daemons. Discover the potential for full chain exploitation and necessary gadgets. Understand the challenges of iOS research, explore IDA techniques, and witness demonstrations of sandbox escape methods. Examine specific vulnerabilities in Bluetooth functionality, including pair device retrieval and session token manipulation. Gain valuable knowledge about iOS security, jailbreaking, and cutting-edge mobile device exploitation techniques.
Syllabus
Introduction
Agenda
What is iOS
Design of iOS
Chart Cache
Mock Messages
Lunch
iOS research difficulties
IDA
Sandbox Escape
Sandbox Target
Map Cache
Message Handler
callbacks
coldframe
decompression session
serialization
Python Implementation
Demo
Results
iOS 11 Refactor
Bluetooth Deep
Get Pair Devices
CV4095
Bug Fix
Bluetooth Session Token
Brute Force
Blue2D Demo
Bug Fixes
Global Variables
Token Change
Jailbreak
Spark
References
Credits
Questions
Taught by
Hack In The Box Security Conference