Home / Series / Chaos Communication Congress / Aired Order / Season 34 / Episode 28

iOS kernel exploitation archaeology

Speaker: argp This talk presents the technical details and the process of reverse engineering and re-implementation of the evasi0n7 jailbreak's main kernel exploit. This work was done in late 2013, early 2014 (hence the "archaeology" in the title), however, it will provide insight into the kernel debugging setup for iOS devices (iDevices), the encountered difficulties and how they were overcome, all of which can be useful for current iOS kernel vulnerability research.

English
  • Originally Aired December 27, 2017
  • Runtime 60 minutes
  • Production Code 8720
  • Created December 27, 2017 by
    Administrator admin
  • Modified December 27, 2017 by
    Administrator admin