• XSS.stack #1 – первый литературный журнал от юзеров форума

BLASTDOOR

xvonfers

RAID-массив
Пользователь
Регистрация
08.06.2024
Сообщения
53
Реакции
58
Анализ от Ian Beer сэмплов BLASTPASS PKPass (которые ему предоставили Amnesty International Security Lab) и о том, как на самом деле работал один из недавних зироклик эксплойтов от NSO для iOS:

"...I had tried a lot to reproduce the exploit primitives on a real device; I built tooling to dynamically generate and sign legitimate PKPass files that I could send via iMessage to test devices and I could crash a lot, but I never seemed to get very far into the exploit - the iOS version range where the heap grooming works seems to be pretty small, and I didn't have an exact device and iOS version match to test on..."

"...Whilst the heap groom was impressively complicated and precise, the exploit still relied on well-known exploitation techniques. Furthermore, the MakerNote bplist groom and callback-JOP PAC defeat techniques..."
1743061414654.png
1743061265548.png

1743060982017.png
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх