Reviews

iOS 6 Kernel Security 4 - Attack Strategies

iOS 6 Kernel Security: A Hacker's Guide

Having highlighted the protections and data leaking mitigations hard-coded into iOS 6, Mark Dowd and Tarjei Mandt are now focusing primarily on the attack vectors. More specifically, the attacks being overviewed are beyond the standard syscall table overwrites, kernel code patching, etc. The researchers describe kernel attacks in different scenarios which allow defeating ASLR.

iOS 6 Kernel Security 3 - Kernel Address Space Protection

iOS 6 Kernel Security: A Hacker's Guide

The technique known as kernel address space protection, which is intended for preventing NULL and offset-to-NULL dereference vulnerabilities in iOS 6, is the key subject matter for discussion in this part. Mark Dowd and Tarjei Mandt dwell on how this problem used to be addressed in the previous version of the platform, and describe in detail how security checks and user/kernel validation are implemented in version 6.

iOS 6 Kernel Security 2 - Data Leaking Mitigations and Kernel ASLR

iOS 6 Kernel Security: A Hacker's Guide

In this part of their Hack in the Box presentation, Azimuth Security’s representatives provide an insight into the goals and tactics for iOS 6 data leaking mitigations, illustrating those with API code samples. Also, objectives and goals of the kernel ASLR strategy, namely randomizing kernel image base and kernel map, are being reviewed here.

iOS 6 Kernel Security - A Hacker's Guide

iOS 6 Kernel Security: A Hacker's Guide

Mark Dowd and Tarjei Mandt from Azimuth Security take the floor at the Hack in the Box conference to provide an all-around overview of iOS 6 security improvements, kernel-based mitigations for the platform, and jailbreak-related issues. The presentation covers iOS 6 kernel security details from both the defensive and offensive perspective.

Combatting Mac OS X / iOS Malware with Data Visualization 2

Combatting Mac OS X / iOS Malware with Data Visualization

As Remy Baumgarten proceeds with his presentation of Mach-O Viz, a solution for Mac OS X and iOS malware analysis, he dwells on the tool’s entire feature set broken into a variety of options for generating and viewing visualized data about a file of interest. Also, the expert provides a demo of how the application handles the samples of code for some known Mac malware.

Combatting Mac OS X / iOS Malware with Data Visualization

Combatting Mac OS X / iOS Malware with Data Visualization

Remy Baumgarten from ANRC Services took the floor at Defcon 21 Conference to tell the audience about a new tool called Mach-O Viz which was designed for Mac malware analysis. In particular, the expert focuses on specific capabilities built into the software, its GUI structure, and visualization benefits it provides.

Search