Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1

ONLINE REGISTRATION CLOSES OCT 13TH AT 23:59 MYT

           

Walk in registrations at The InterContinental for the conference on 16th and 17th are still accepted (walk-in rate MYR1499).

For up-to-the-minute updates on #HITB2013KUL including on-site happenings during the event, please follow @hitbsecconf on Twitter.

Joshua ‘@p0sixninja’ Hill (Independent Security Researcher)

PRESENTATION TITLE: SHAttered Dreams

PRESENTATION ABSTRACT:

WIn the past 5 years, since Apple has unleashed the iPhone to the world, there has been only 5 different BootROM exploits seen publicly in the wild. Of these few exploits, even fewer people have been involved in the discovery and exploitation of them. This is primarily due to very limited debugging possibilities, limited information exposed on how iOS BootROM works and how these vulnerabilities were discovered and exploited. If more researchers understood how the iOS BootROM worked and how past exploits were found and created then more researchers could assist in finding and exploiting new iOS BootROM vulnerabilities for newer A5 and A6 devices.

In this presentation I plan to do exactly that. We will be breaking down the inner-workings of the iOS BootROM and show how previous vulnerabilities were discovered and exploited. First we will cover how the BootROM has been dumped from iOS devices in the past. Next we’ll have a brief walk through on how the BootROM works and the different execution paths it can take. Then we will take a detail look into the previous iOS BootROM exploits, including how they were discovered, analyzed, different ideas used to attempt exploitation, and how they were eventually exploited to create the permanent exploits used in most Jailbreaking software today. Finally we’ll get into some theoretical situations and discuss how different types of vulnerabilities (if discovered) could be exploited on the device to create a unpatchable jailbreak.

This presentation will be told from a first person point of view from a person who was actually there to witness it all unfold, with first-hand experience in the subject. Finally the untold story of iOS BootROM exploitation (which has always gone on behind closed doors) will be told to the world.

ABOUT JOSHUA HILL

Joshua Hill (aka @p0sixninja) has been an inspirational (yet sometimes controversial) figure in the iOS Jailbreaking scene for over 5 years now. He was the chief architect and developer for the software used in the GreenPois0n and Absinthe jailbreaks, and also performed research to help find and exploit many of the vulnerabilities used. He now works as an Independent Security Researcher and performs training on iOS security all over the world.

EVENT ORGANIZER

SUPPORTED AND ENDORSED BY

TITANIUM SPONSOR (SPEAKERS RECEPTION + POST CONFERENCE RECEPTION)

GOLD SPONSORS

SILVER SPONSORS

CTF SPONSOR

CTF PRIZE SPONSOR

INTERNET CONNECTIVITY PARTNER

ALCO_PWN SPONSOR (POST CONFERENCE RECEPTION)

HackWEEKDAY Official Ride Partner

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2013 Hack In The Box | http://www.hackinthebox.org