|
@NedWilliamson | |||||
|
Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow! googleprojectzero.blogspot.com/2019/12/sockpu… youtube.com/watch?v=YV3jew…
|
||||||
|
||||||
|
tylerni7
@tylerni7
|
10. pro |
|
Awesome writeup! Easy to read, great walk through of the process, super nice bug.
A+++++ would read again
|
||
|
|
||
|
nedwill
@NedWilliamson
|
11. pro |
|
Thanks Tyler!
|
||
|
|
||
|
SorryMybad
@S0rryMybad
|
11. pro |
|
!!!!!!!!!!!!!!!!!!!!!!!!!!1
|
||
|
|
||
|
Looben Yang
@loobeny
|
11. pro |
|
Rarely seen nice write-up which covers a lot of detail from discovery to exploitation!
|
||
|
|
||
|
Scott Knight
@sdotknight
|
12. pro |
|
Amazing write up! I also strongly agree with your request in the conclusion.
“Finally, if Apple made XNU sources available more often, ideally per-commit, I could have automated merging my fuzzer against the sources and we could have caught the iOS 12.4 regression immediately.”
|
||
|
|
||
|
matthew_mabe
@Matthewmabe6
|
3. sij |
|
Will there be a chimera jailbreak for iOS 12.4.1
|
||
|
|
||
|
kabal089
@kabal089
|
10. pro |
|
Awesome write up Ned, many thanks
|
||
|
|
||
|
Doge
@Xx_Doge69_xX
|
11. pro |
|
Great video, I could actually semi follow it and not get completely lost by the end, which is a first for me. What I am wondering is how tf does a fuzzer work, and how is it able to find wonky stuff like this?
|
||
|
|
||