Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Machswap - Stephen Parkinson

White Hat Cal Poly via YouTube

Overview

Explore the inner workings of iOS jailbreaking in this 28-minute talk by Stephen Parkinson from White Hat Cal Poly. Dive deep into the machswap vulnerability that enabled kernel access for iOS 12 jailbreak developers. Learn about crucial components like XUMO, Mailbox, MIG, and Afterfree. Understand the roles of Garbage Collection, Fake Port Spray, and Mock Vouchers in the jailbreaking process. Examine advanced concepts such as ThreadGetThreadForTask, SLR, Kernel Task Board, and VMmap. Gain insights into the TIP receiver and the final steps of creating a jailbreak. Perfect for those interested in iOS security, vulnerability research, and the technical aspects of mobile device exploitation.

Syllabus

Introduction
Overview
Last quarter
XU
MOC
Mailbox
MIG
MIG code
Afterfree
De Ville
Garbage Collection
FakePort
Spray
Get Mock Voucher
Fake Port
ThreadGet
ThreadForTask
SLR
Kernel Task Board
VMmapT
IP receiver
Jailbreak
Conclusion

Taught by

White Hat Cal Poly

Reviews

Start your review of Machswap - Stephen Parkinson

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.