Explore the inner workings of iOS jailbreaking in this 28-minute talk by Stephen Parkinson from White Hat Cal Poly. Dive deep into the machswap vulnerability that enabled kernel access for iOS 12 jailbreak developers. Learn about crucial components like XUMO, Mailbox, MIG, and Afterfree. Understand the roles of Garbage Collection, Fake Port Spray, and Mock Vouchers in the jailbreaking process. Examine advanced concepts such as ThreadGetThreadForTask, SLR, Kernel Task Board, and VMmap. Gain insights into the TIP receiver and the final steps of creating a jailbreak. Perfect for those interested in iOS security, vulnerability research, and the technical aspects of mobile device exploitation.
Overview
Syllabus
Introduction
Overview
Last quarter
XU
MOC
Mailbox
MIG
MIG code
Afterfree
De Ville
Garbage Collection
FakePort
Spray
Get Mock Voucher
Fake Port
ThreadGet
ThreadForTask
SLR
Kernel Task Board
VMmapT
IP receiver
Jailbreak
Conclusion
Taught by
White Hat Cal Poly