• XSS.stack #1 – первый литературный журнал от юзеров форума

iOS Web Browser (Safari) 1day RCE Exploit

NextGenPentesters

HDD-drive
Пользователь
Регистрация
07.05.2024
Сообщения
26
Реакции
6
The new exploit of penetrating to iOS through web browser named Safari has become public.

File no password, enjoy!

Note: This post is just for educational purposes and should not be used for any malicious activities (like i don't do it on my own!).
 
would be interesting to know how to deploy this ... thansk!
yeah but first i clarify its path for you. I've also written a small article about it:

The fundamentals of iOS security
Before diving into iOS-specific vulnerabilities, ensure you completely understand the following subjects:
iOS Internals – Study how iOS architecture works (kernel, sandboxing, code signing, memory protections).
Objective-C and Swift – Since iOS applications are mainly written in these languages, understanding them is crucial.
WebKit Engine – Safari is built on WebKit, so analyzing its components and rendering engine is key.
Since Safari is based on WebKit, you need to analyze its vulnerabilities, particularly Use-After-Free (UAF), Type Confusion, and Memory Corruption bugs.
Study past Safari/WebKit exploits to understand JavaScript JIT compilation attacks, sandbox escapes, and memory vulnerabilities.

Set Up a Secure Research Environment
To analyze vulnerabilities, create a research-only iOS environment:
iOS device or jailbroken iPhone
Use a jailbroken device (iOS 14 or older is preferred) to inspect runtime behavior.
Install tools like Frida, Hopper, lldb, gdb, and iOS Sandboxing tools.
iOS Simulator + WebKit Debugging
Use Xcode’s iOS Simulator and Safari’s Developer Tools to analyze JavaScript engine behavior.
Enable WebKit remote debugging via safaridriver.


Virtual iOS testing
Services like Corellium allow iOS virtualization for exploit research.
Use WebKit’s built-in fuzzers to test Safari.
Study AFL (American Fuzzy Lop) and libFuzzer to detect vulnerabilities in WebKit components.
Write custom fuzzers for JavaScriptCore and JIT compiler attacks.

Exploit development tools for iOS
Frida – Hook functions and inspect WebKit runtime.
Ghidra/Hopper/IDA Pro – Disassemble and analyze Safari binaries.
LLVM Sanitizers – Use AddressSanitizer to find memory corruption bugs.
lldb – Debug and step through Safari’s WebKit processes.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх