Skip to main content
Mactans - Injecting Malware into iOS Devices via Malicious Chargers

Mactans - Injecting Malware into iOS Devices via Malicious Chargers

Researchers from the Georgia Institute of Technology deliver a remarkable presentation at the Black Hat conference, highlighting iOS security essentials and an unprecedented proof-of-concept attack that they came up with. In particular, the study provides a non-trivial perspective of how the so-called ‘walled garden model’ is implemented, with its strong points as well as shortcomings. Importantly, the Mactans concept is also overviewed in this presentation, describing the process of attacking iDevices via an especially designed charger.

John Dee
John Dee
3.5K
iOS 6 Kernel Security 4 - Attack Strategies

iOS 6 Kernel Security 4 - Attack Strategies

Having highlighted the protections and data leaking mitigations hard-coded into iOS 6, Mark Dowd and Tarjei Mandt are now focusing primarily on the attack vectors. More specifically, the attacks being overviewed are beyond the standard syscall table overwrites, kernel code patching, etc. The researchers describe kernel attacks in different scenarios which allow defeating ASLR.

John Dee
John Dee
3.0K
iOS 6 Kernel Security 3 - Kernel Address Space Protection

iOS 6 Kernel Security 3 - Kernel Address Space Protection

The technique known as kernel address space protection, which is intended for preventing NULL and offset-to-NULL dereference vulnerabilities in iOS 6, is the key subject matter for discussion in this part. Mark Dowd and Tarjei Mandt dwell on how this problem used to be addressed in the previous version of the platform, and describe in detail how security checks and user/kernel validation are implemented in version 6.

John Dee
John Dee
2.9K
iOS 6 Kernel Security 2 - Data Leaking Mitigations and Kernel ASLR

iOS 6 Kernel Security 2 - Data Leaking Mitigations and Kernel ASLR

In this part of their Hack in the Box presentation, Azimuth Security’s representatives provide an insight into the goals and tactics for iOS 6 data leaking mitigations, illustrating those with API code samples. Also, objectives and goals of the kernel ASLR strategy, namely randomizing kernel image base and kernel map, are being reviewed here.

John Dee
John Dee
3.4K
iOS 6 Kernel Security - A Hacker's Guide

iOS 6 Kernel Security - A Hacker's Guide

Mark Dowd and Tarjei Mandt from Azimuth Security take the floor at the Hack in the Box conference to provide an all-around overview of iOS 6 security improvements, kernel-based mitigations for the platform, and jailbreak-related issues. The presentation covers iOS 6 kernel security details from both the defensive and offensive perspective.

John Dee
John Dee
3.5K
Top 10 iOS 7 Hidden Features

Top 10 iOS 7 Hidden Features

This article is intended to shed light upon the useful features of the new iOS 7 platform which many Apple users may not yet know about although they are there. We have singled out the top 10 hidden features that significantly facilitate managing your device and make it a yet handier thing in terms of everyday use. So get ready to learn about the iOS 7 capabilities you will definitely love after reading this review of ours.

John Dee
John Dee
3.0K