Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

37C3 - Apple's iPhone 15: Under the C

Автор: media.ccc.de

Загружено: 2024-01-31

Просмотров: 44094

Описание:

https://media.ccc.de/v/37c3-12074-app...

Hardware hacking tooling for the new iPhone generation

Hardware hacking tooling for the new iPhone generation

If you've followed the iPhone hacking scene you probably heard about cables such as the Kanzi Cable, Kong Cable, Bonobo Cable, and so on: Special cables that allow access to hardware debugging features on Lightning-based iPhones such as UART and JTAG. However with the iPhone 15, all of those tools became basically useless: USB-C is here, and with that we need new hardware and software tooling.

This talk gives you a brief history of iPhone hardware hacking through the Lightning port, and then looks at the new iPhone 15, and how - using vendor defined messages, modifying existing tooling like the Central Scrutinizer, and a bit of hardware hacking - we managed to get access to the (unfortunately locked on production devices) JTAG interface exposed on the USB-C port on the new iPhone 15.

And how you can do it using open-source tooling too.

The iPhone's Lightning connector was a proprietary beast with a lot of hidden features: By sending custom SDQ commands there, it was possible to get it to expose hardware debugging features such as JTAG and UART. For a long time, this was only easily possible using either gray and black-market cables such as the Kanzi-Cable, or proprietary tools such as the Bonobo Cable. Last year, we released an open-source tool to get access to the iPhone debugging features called the Tamarin Cable - finally allowing anyone to get JTAG and UART on the iPhone for just a couple of $ in parts.

But then the iPhone 15 came along, and with that USB-C: All previous hardware and software tooling basically became useless, but that did not stop us from trying: We knew from the Apple Silicon macs and the work of t8012-team and the AsahiLinux project that Apple uses USB-C's VDM feature - Vendor Defined Messages - to allow access to features such as the UART console, and so chances were high that we could use something similar to get access to the hardware debugging features on the iPhone 15.

So we pre-ordered the iPhone 15, a couple of PCBs, a case of Club Mate and got started: And less than 48 hours after the launch we got JTAG working on the iPhone 15.

In this talk we will start by looking at the history of iPhone and Lightning hardware hacking, and then look at how USB-C is used for debugging on Apple Silicon devices, and what we had to do to get JTAG on the iPhone 15.

We will also use this talk to release the new version of the open-source Tamarin Cable firmware: Tamarin-C. A fully integrated, open-source debugging probe for the iPhone 15 and other Apple Silicon devices. Tamarin-C is also able to give access to a DFU mode that you can't access without sending VDMs.


Note: This talk will not contain any 0days or previously unknown vulnerabilities. Production iPhones are locked, and so while we get access to some of the device's busses we can't for example access the CPU core.


This talk is about building tooling for future work.

stacksmashing

https://events.ccc.de/congress/2023/h...

#37c3 #Security

37C3 -  Apple's iPhone 15: Under the C

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

37C3 -  Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

37C3 - Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

Получение JTAG на iPhone 15

Получение JTAG на iPhone 15

38C3 - ACE up the sleeve: Hacking into Apple's new USB-C Controller

38C3 - ACE up the sleeve: Hacking into Apple's new USB-C Controller

37C3 -  Operation Triangulation: What You Get When Attack iPhones of Researchers

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

OpenSSL Conference 2025 - D.Zuvic & P.Schmidberger - OpenSSL Providers in the Automotive Environment

OpenSSL Conference 2025 - D.Zuvic & P.Schmidberger - OpenSSL Providers in the Automotive Environment

Building the PERFECT Linux PC with Linus Torvalds

Building the PERFECT Linux PC with Linus Torvalds

37C3 -  Adventures in Reverse Engineering Broadcom NIC Firmware

37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware

The Fastest Computer I've Ever Had

The Fastest Computer I've Ever Had

38C3 - Find My * 101

38C3 - Find My * 101

The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)

The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)

Белый хакер разбирает сцены из фильмов «Хакеры», «Матрица», «Мистер Робот», «Черное зеркало» и др

Белый хакер разбирает сцены из фильмов «Хакеры», «Матрица», «Мистер Робот», «Черное зеркало» и др

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

Разбираем зачем он нужен и как им пользоваться | Первый отдел

Разбираем зачем он нужен и как им пользоваться | Первый отдел

37C3 -  Breaking

37C3 - Breaking "DRM" in Polish trains

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Мессенджер Max: разбираемся без паранойи и даем советы по безопасности

Мессенджер Max: разбираемся без паранойи и даем советы по безопасности

Как были взломаны Apple AirTags

Как были взломаны Apple AirTags

Самая Дорогая Ложь В Истории Авиации

Самая Дорогая Ложь В Истории Авиации

Эра Nvidia закончилась: Apple только что представила самый мощный в мире чип для искусственного и...

Эра Nvidia закончилась: Apple только что представила самый мощный в мире чип для искусственного и...

ТОПОВЫЙ ПК APPLE ИЗ 2000 - PowerMac G4

ТОПОВЫЙ ПК APPLE ИЗ 2000 - PowerMac G4

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]