36C3 - Messenger Hacking: Remotely Compromising an iPhone through iMessage

  Рет қаралды 24,459

media.ccc.de

media.ccc.de

4 жыл бұрын

media.ccc.de/v/36c3-10497-mes...
So called “0-click” exploits, in which no user interaction is required to compromise a mobile device, have become a highly interesting topic for security researchers, and not just because Apple announced a one million dollar bug bounty for such exploits against the iPhone this year. This talk will go into the details of how a single memory corruption vulnerability in iMessage was remotely exploited to compromise an iPhone. The insights gained from the exploitation process will hopefully help defend against such attacks in the future.
This talk will dive into the internals of an iMessage exploit that achieves unsandboxed remote code execution on vulnerable devices (all iPhones and potentially other iDevices up to iOS 12.4) without user interaction and within a couple of minutes. All that is necessary for a successful attack in a default configuration is knowledge of the target’s phone number or an email address. Further, the attack is also possible without any visible indicators of the attack displayed to the user.
First, an overview of the general iMessage software architecture will be given, followed by an introduction of the exploited vulnerability. Next, a walkthrough of the exploitation process, including details about how the various exploit mitigations deployed on iOS were bypassed, will be presented. Some of the exploitation techniques are rather generic and should be applicable to exploit other vulnerabilities, messengers, and even other platforms such as Android. Along the way, some advice will be shared with the audience on how to bootstrap research in this area. The talk concludes with a set of suggestions for mobile OS and messenger vendors on how to mitigate the demonstrated exploit techniques effectively and hopefully make these kinds of attacks significantly more difficult/costly to perform in the future. While previous experience with iOS userland exploitation will not be required for this talk, some basic background knowledge on memory corruption vulnerabilities is recommended.
Samuel Groß
fahrplan.events.ccc.de/congre...

Пікірлер
36C3 -  SIM card technology from A-Z
1:03:23
media.ccc.de
Рет қаралды 19 М.
36C3 -  Open Source is Insufficient to Solve Trust Problems in Hardware
1:00:46
Son ❤️ #shorts by Leisi Show
00:41
Leisi Show
Рет қаралды 8 МЛН
لااا! هذه البرتقالة مزعجة جدًا #قصير
00:15
One More Arabic
Рет қаралды 15 МЛН
Alex hid in the closet #shorts
00:14
Mihdens
Рет қаралды 18 МЛН
36C3 -  How to Break PDFs
58:43
media.ccc.de
Рет қаралды 33 М.
Spyware Exploits Calendar App to Hack iPhones
6:25
Seytonic
Рет қаралды 149 М.
Edward Snowden: How Your Cell Phone Spies on You
24:16
JRE Clips
Рет қаралды 18 МЛН
36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security
57:22
media.ccc.de
Рет қаралды 12 М.
Is Skynet watching you already?
1:04:00
David Bombal
Рет қаралды 1 МЛН
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
45:23
David Bombal
Рет қаралды 2,1 МЛН
Hack With SMS | SMS Spoofing like Mr. Robot!
11:32
zSecurity
Рет қаралды 1 МЛН
Son ❤️ #shorts by Leisi Show
00:41
Leisi Show
Рет қаралды 8 МЛН