Presented at
Objective by the Sea version 2.0 (2019),
June 2, 2019, 11:30 a.m.
(30 minutes).
In 1997 Apple released the first iMac (in many colors). Shortly thereafter MacOS9 shipped with a myriad of new features. One such feature, support for serial line modems, was flawed. Since then, (until rather recently!) ever single Mac has been vulnerable. In this talk I'll walk through how I approached finding the vulnerability and developed a full persistence root exploit chain ...from start to finish.
Presenters:
-
Joshua Hill
- Chief Research Officer at Sudo Security Group
Joshua Hill (aka [@p0sixninja](https://twitter.com/p0sixninja)), has been an inspirational (yet sometimes controversial) figure in the iOS Jailbreaking scene for many years. He was the chief architect and developer for the software used in the GreenPois0n and Absinthe jailbreaks, and also performed research to help find and exploit many of the vulnerabilities used.
He currently works as the CRO of Sudo Security Group, the company creating Guardian Mobile Firewall; the first and only smart firewall for iOS.
Links: