Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=YV3jewkUJ54



Duration: 23:45
157,669 views
5,626


Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS and macOS. He also shows us what primitives the bug provides and how it can be exploited. This is only the first stage of a Jailbreak, but it's a very valuable kernel bug.

Google Project Zero Blog: https://googleprojectzero.blogspot.com/2019/12/sockpuppet-walkthrough-of-kernel.html
Ned on Twitter: https://twitter.com/NedWilliamson
Ned Williamson - Modern Source Fuzzing (OffensiveCon19): https://www.youtube.com/watch?v=xzG0pLM4Q64

-=[ โค๏ธ Support ]=-

โ†’ per Video: https://www.patreon.com/join/liveoverflow
โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ ๐Ÿ• Social ]=-

โ†’ Twitter: https://twitter.com/LiveOverflow/
โ†’ Website: https://liveoverflow.com/
โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
โ†’ Facebook: https://www.facebook.com/LiveOverflow/







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
XNU kernel
macos hack
osx hacked
ios hack
jailbreak
sockpuppet
sock puppet
use after free
fuzzing kernel
kernel fuzzer
syscall fuzzer
fuzz testing
ned williamson
ipv6 sockets
protobuf
asan
advanced exploitation
memory corruption
free malloc