But How Does a Kernel Exploit Actually Work?
Автор: Billy Ellis
Загружено: 2025-02-07
Просмотров: 7621
Are you a security researcher or reverse engineer?
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals, not corporations. Cannot be combined with any other promo code or discount.
** Cannot be combined with any other promo code or discount.
/////////////////////////////////
Hey guys - welcome to part II of this mini video series covering the PhysPuppet exploit for iOS. Today we look at how we can influence the iOS kernel's memory to reuse our dangling vm_page for important object allocation, which we can then leverage to build read and write primitives.
Watch part 1 - • Physical Use-After-Free in the iOS Kernel ...
weightBufs exploit - https://github.com/0x36/weightBufs
xnuspy - https://github.com/jsherman212/xnuspy
alfiecg blog - https://alfiecg.uk/
Talk to me on X - https://x.com/bellis1000
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: