The Last Line of Defense Understanding and Attacking Apple File System on iOS

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=N_i7GvtWKs4



Duration: 24:59
2 views
0


With its rapid evolvement, Apple has deployed many mechanisms in iOS to defend against potential threats and risks. Among system components, filesystem is considered to be the last line of defense against attackers' attempts to steal and tamper users' private data, as well as preventing permanent damage such as installation of backdoors or malicious applications.

In consideration of both security and performance, Apple recently proposed and deployed a new filesystem, called Apple File System (APFS), on iOS and macOS. Especially on iOS, as required by the system's rigorous security policies, APFS has adopted several protection mechanisms to prevent critical files and directories from being tampered even in face of attackers with kernel privileges. But, in our study, we found that these mechanisms are not as secure as they are supposed to be, and we successfully discovered ways to exploit or bypass them.

In this talk, we will first introduce the architecture of filesystem on Apple systems as well as the basic structure of APFS. Then we will explain previous attacks on APFS, and elaborate APFS's new mitigation through several experiments. Most importantly, our talk will propose a new attack to bypass the APFS's mitigation, which allows an attacker to tamper any file or directory on the system.

The knowledge of APFS architecture, its weak points, and our new attack elaborated in this talk is indispensable to iOS hackers and jailbreakers, which has not been thoroughly presented in any previous talks. We believe that our talk will inspire the design of a securer filesystem on Apple systems.


Presenters:
Min Zheng / Spark - Security Expert, Alibaba Inc.   as Min (Spark) Zheng
Min (Spark) Zheng (twitter@SparkZheng, github@zhengmin1989) is a security expert in Alibaba Orion Security Lab. He received his Ph.D. in the CSE department of the CUHK. His research focuses on malware analysis, smartphone (Android & iOS) security, system design, and implementation. Before receiving Alibaba A-Star offer award in 2015, he worked at FireEye, Baidu, and Tencent. He was the champion of GeekPwn 2014 and AliCTF 2015. He won the"best security researcher" award in FIT 2016 for detecting the iOS/macOS vulnerabilities, XcodeGhost virus, and WormHole RCE vulnerability. He is a member of the OverSky team for private jailbreaking development. He has presented his research in DEF CON, HITB, BlackHat, ISC, XCon, etc.
Xiaolong Bai - Security Engineer, Alibaba Inc.
Xiaolong Bai (twitter@bxl1989, github@bxl1989) is a security engineer in Alibaba Orion Security Lab. Before joining Alibaba, he received his Ph.D. at Tsinghua University. He has published several research papers at top conferences including IEEE S&P, Usenix Security, CCS, NDSS, and presented his research in Black Hat USA and Hack In The Box. He has been acknowledged by famous vendors including Apple, Google, Facebook, Evernote, and Tencent for his contribution in discovering the vulnerabilities in their systems and improving the security of their products. He is a member of the OverSky team for private jailbreaking development.
Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21Locknote Conclusions and Key Takeaways from Black Hat Europe 2018
2021-12-21When Machines Can't Talk Black Hat - Europe - 2018
2021-12-21Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces
2021-12-21AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace
2021-12-21Where 2 Worlds Collide Bringing Mimikatz et al to UNIX
2021-12-21Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild
2021-12-21Attacking and Defending Blockchains From Horror Stories to Secure Wallets
2021-12-21Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes
2021-12-21Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM
2021-12-21Attacking Hardware Systems Using Resonance and the Laws of Physics
2021-12-21The Last Line of Defense Understanding and Attacking Apple File System on iOS
2021-12-21Eternal War in XNU Kernel Objects Black Hat - Europe - 2018
2021-12-21Evolving Security Experts Among Teenagers Black Hat - Europe - 2018
2021-12-21No Free Charge Theorem 2 0 How to Steal Private Information from a Mobile Device Using a Powerbank
2021-12-21Off Path Attacks Against PKI Black Hat - Europe - 2018
2021-12-21How to Build Synthetic Persons in Cyberspace
2021-12-21Perception Deception Physical Adversarial Attack Challenges
2021-12-21BLEEDINGBIT Your APs Belong to Us Black Hat - Europe - 2018
2021-12-21Perfectly Deniable Steganographic Disk Encryption
2021-12-21DIFUZE Android Kernel Driver Fuzzing Black Hat - Europe - 2017
2021-12-21Becoming You A Glimpse Into Credential Abuse



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering