Tweets

You blocked @i41nbeer

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @i41nbeer

  1. 27 Dec 2018

    hello

    Undo
  2. 18 Oct 2018

    A blog post about turning back the clock to 2014, and thinking about what 2022 might be like:

    Undo
  3. 19 Sep 2018

    And if you're using the mptcp/vfs exploits for security research (eg with Electra 11.3.1) you should just keep using that. I'll release the 11.4.1 exploits I have but the focus will shift to iOS 12 now :)

    Show this thread
    Undo
  4. 19 Sep 2018

    The iOS 12 security bulletin seems to only include iOS-only bugs this time (as opposed to those which affect iOS *and* MacOS.) There are far more fixes in iOS 12 than are mentioned, including a nasty logic bug to break you out of the app sandbox. Update your personal devices!

    Show this thread
    Undo
  5. 9 Aug 2018

    Here are the slide from my talk yesterday: Please expand the speaker notes if you read it!

    Show this thread
    Undo
  6. 8 Aug 2018

    I'd love to get a chance to sit down with you and discuss how together we can make iOS even more secure for all our users. Cheers, Ian Beer.

    Show this thread
    Undo
  7. 8 Aug 2018

    Hi , I've been working for years to help make iOS more secure. Here's a list of all the bugs I reported which qualified for your bug bounty since its launch, could you invite me to the program so we can donate this money to ?

    Show this thread
    Undo
  8. 24 Jul 2018

    Please read README_KDP before trying to use this. There are many limitations, but I have found it useful for vulnerability research nevertheless.

    Show this thread
    Undo
  9. 24 Jul 2018

    Here's an updated version of async_wake with a more usable KDP-based kernel debugger:

    Show this thread
    Undo
  10. 29 Jun 2018
    Undo
  11. 17 Jun 2018

    Fixing that in combination with enabling 20 spinner threads seems to show reliability closer to 50% in some very unscientific testing, but I'm sure there are still plenty of bugs. 's writeup had plenty more good ideas for improving reliability.

    Show this thread
    Undo
  12. 17 Jun 2018

    credit to for spotting a bug in empty_list: on devices with 16k pages there are 0x61 ipc_port allocations per zone refill (not sure where 0xe0 came from...); so it should look like this: int ports_per_zcram = kernel_page_size == 0x1000 ? 0x49 : 0x61;

    Show this thread
    Undo
  13. 13 Jun 2018

    empty_list, a proof-of-concept exploit for the getvolattrlist iOS 11.3.1 kernel bug: Please read the README.

    Undo
  14. 8 Jun 2018
    Undo
  15. 5 Jun 2018

    (footnote: for the vfs bug technically you can control a handful of bits in the 8 overflow bytes, the overflow value is actually two 4 byte flag fields. This may or may not help.)

    Show this thread
    Undo
  16. 5 Jun 2018

    Finally: always keep your personal iOS devices up to date and only use these tools on devices which don't have any personal information and are only used for research.

    Show this thread
    Undo
  17. 5 Jun 2018

    The trigger is here: If you're in to iOS exploit dev take a go at it and blog about it! I'll publish what I have soon, hopefully this week.

    Show this thread
    Undo
  18. 5 Jun 2018

    see eg The Poisoned Nul Byte, 2014 by . But it takes time. The mptcp exploit is mostly recycled bits of earlier exploits. The getvolattrlist bug needs some new techniques.

    Show this thread
    Undo
  19. 5 Jun 2018

    The vfs bug doesn't require an Apple developer cert but is considerably harder to exploit. You get to write 8 NULL bytes off the end of a kalloc.16 buffer. It's sufficiently hard to exploit that it's worth trying just to demonstrate that such issues are reliably exploitable...

    Show this thread
    Undo
  20. 5 Jun 2018

    That is the same bug as already publicly documented from the patch by and exploited by , see John's repo here:

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·