The takeaway from this project should not be: no one will spend six months of their life just to hack my phone, I'm fine. View all the photos, read all the email, copy all the private messages and monitor everything which happens on there in real-time. No, sadly not an incantation to convince the kids to sleep in until 9am every morning, but instead a wormable radio-proximity exploit which allows me to gain complete control over any iPhone in my vicinity. "įor 6 months of 2020, while locked down in the corner of my bedroom surrounded by my lovely, screaming children, I've been working on a magic spell of my own. "Exploits are the closest thing to "magic spells" we experience in the real world: Construct the right incantation, gain remote control over device. Quoting Offensivecon keynote from February 2020: ![]() Over the next 30'000 words I'll cover the entire process to go from this basic demo to successfully exploiting this vulnerability in order to run arbitrary code on any nearby iOS device and steal all the user data Introduction ![]() In this demo I remotely trigger an unauthenticated kernel memory corruption vulnerability which causes all iOS devices in radio-proximity to reboot, with no user interaction.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |