by Stefan Esser
For years now Apple has kept adding new security mitigations to iOS and iOS devices that put them often ahead of their competition. Naturally attackers had to adopt their techniques to break into these new versions of iOS with every new protection. Because of this these techniques have been usually kept private.
In this session the audience will be introduced to a set of iOS kernel exploitation techniques that have been used in private jailbreaks for a while now and only recently have been revealed to the public by a partial iOS 10.2 jailbreak that has been uploaded to GitHub. This session will give a complete walk through of the original techniques and explain how exactly they were intended to be used.
Slides not available.