[ mainpage :: register :: training :: conference :: hitb-labs :: the venue ]
[ capture the flag (CTF) :: wireless village :: lock picking village (LPV) :: open-hack ]
[ call for papers (CFP) :: conference agenda :: sponsors :: press/media :: forum ]
[ conference kit (PDF) :: past conferences :: contact us ]


HITBSecConf2008 - Malaysia (Day 1)

HITBSecConf2008 - Malaysia (Day 2)

Registration for HITBSecConf2009 - Dubai is also now open.

Charlie Miller (Principal Analyst, Independent Security Evaluators)

Filed under: Main Page — Administrator @ 11:14 am

Presentation Title: iPwning the iPhone
Presentation Abstract:

This talk will begin with a some basics about the iPhone and its architecture. What kind of hardware is on the device, what kind of applications come by default, what does the file system look like? It will then show how to get terminal access to a device including ssh access to it.

Next, the attack surface of the iPhone will be contrasted with that of the a typical Mac OS X Leopard computer. Ways to find vulnerabilities on the iPhone will be discussed including fuzzing and reverse engineering when applied to the iPhone. In particular, the iPhone SDK will be shown to be an effective tool in finding iPhone vulnerabilities.

Next, iPhone specific exploitation techniques will be discussed. These include taking into account the limited physical resources of the iPhone. The exploit used to win PwnToOwn at CanSecWest 2008 will be shown ported to the iPhone (1.4.1).

Finally, iPhone shellcode payloads will be demonstrated. These will include iphone specific shellcode as well as typical port bind shellcode. Writing shellcode in the absence of the /bin/sh executable will be highlighted. The highlight will be injecting arbitrary libraries into a compromised process.

About Charlie

Charlie Miller is Principal Analyst at Independent Security Evaluators. He is best known as the first to publicly create a remote exploit against the iPhone and has discovered flaws in numerous applications on various operating systems. He has spoken at the Workshop on the Economics of Information Security, Black Hat, DEFCON, ToorCon, ShmooCon, and CanSecWest. He has authored the book “Fuzzing for Software Security Testing and Quality Assurance” and the forthcoming “The Mac Hacker’s Handbook”. He won a MacBook Air by winning the Pwn2Own contest in 2008 for breaking into a fully patched Mac OS X computer. He has a PhD from the University of Notre Dame.

Event Organizer

Hack In The Box (M) Sdn. Bhd.

Supported & Endorsed By

Malaysian National Computer Confederation

Multimedia Development Corporation

Platinum Sponsors

Titanium Sponsor (Post Conference Reception)

Gold Sponsors

CTF Sponsor

CTF Prize Sponsor

Open-Hack Sponsor

Metro-e and Official Bandwidth Sponsor

Network Equipment Sponsor

Our Speakers are Supported By

Supporting Media:

Virus Bulletin

InfoSec News

InfoSec News

XAKEP (Russia)

Supporting Organizations

Professional Information Security Association - Hong Kong

Special Interest Group in Security & Information InteGrity Singapore