DEF CON 31 - Apples Predicament - NSPredicate Exploitation on macOS and iOS - Austin Emmitt

  Рет қаралды 6,125

DEFCONConference

DEFCONConference

Күн бұрын

In 2021 the FORCEDENTRY sandbox escape introduced the usage of NSPredicate in an iOS exploit. This new technique allowed attackers to sidestep codesigning, ASLR, and all other mitigations to execute arbitrary code on Apple devices. As a result, Apple put in place new restrictions to make NSPredicate less powerful and less useful for exploits. This presentation will cover new research showing that these added restrictions could be completely circumvented in iOS 16, and how NSPredicates could be exploited to gain code execution in many privileged iOS processes. This technical deep dive will be a rare instance of iOS security that anyone can comprehend without years of experience.
After an overview of the classes involved, we will explore the full syntax of NSPredicate and cover how it can be used to script the Objective-C runtime and even call any C function. It will be shown that PAC can still be bypassed 100% reliably with NSPredicates in order to execute any function with arbitrary arguments. A new tool will be unveiled to help craft complex NSPredicates to execute arbitrary code and inject those predicates in any application. Additionally, a demonstration will be given which executes arbitrary code in the highly privileged Preferences app.
Finally, the talk will cover a bypass of NSPredicateVisitor implementations which allows a malicious process to evaluate any NSPredicate within several system processes including coreduetd, appstored, OSLogService, and SpringBoard. Next there will be a live demo of exploiting SpringBoard to steal a user’s notifications and location data. The presentation will end with some discussion about what can still be done with NSPredicates now that these issues have been fixed, including bypassing App Store Review, and what app developers should know to keep their own apps safe.

Пікірлер: 9
@aravgarg2234
@aravgarg2234 Жыл бұрын
amazing talk and many intricate details!
@ReissZ
@ReissZ Жыл бұрын
Y’know audio engineer here.. I honestly could give af lol Awesome presentation Happy New Year everybody
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
*couldn't give a f**k...
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
Absolutely fucking loved this talk. I also couldn't stop thinking about this attack surface after reading the project zero paper. Great job dude! What's your twitter again bro?
@ReissZ
@ReissZ Жыл бұрын
all I hear is that ticking sound...
@alkali99
@alkali99 Жыл бұрын
98% of my preparation was trying to stop making that sound. the fact that its the only comment is really my worst fear coming true. thanks!
@jamespreston7712
@jamespreston7712 Жыл бұрын
Rude
@Latsu15
@Latsu15 Жыл бұрын
I didn't notice it much until you mentioned it. I think it's not that bad tbqh.
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
47:34
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
What's available for Fabric CI/CD
43:38
Microsoft Reactor
Рет қаралды 599
#OBTS v6.0: "Escaping the Safari Sandbox in iOS 16" - Ian Beer
33:30
Objective-See Foundation
Рет қаралды 1 М.
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН