Look, No Hands! — The Remote, Interaction-less Attack Surface of the iPhone explores the remote, interaction-less attack surface of iOS. In this 50-minute Briefing a Google security engineer will discuss the potential for vulnerabilities in SMS, MMS, Visual Voicemail, iMessage and Mail, and explain how to set up tooling to test these components. You’ll also see two informative examples of vulnerabilities discovered using these methods.
You can also check out Attacking iPhone XS Max for expert insight into how Apple’s implementation of Pointer Authentication Code (PAC) on the A12 SoC comes more into play for exploit mitigations This talk will discuss Apple’s PAC implementation based on tests, introduce an ancient bug in the XNU that is still affecting the latest official release of iOS (i.e. 12.1.4), and elaborate on how to bypass PAC and gain arbitrary kernel read/write. You’ll also learn about post exploitation techniques, including how to make arbitrary kernel function call based on arbitrary kernel read/write.
In All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices security experts will show a study of Apple device unique identification and cross-device tracking technologies. Experts will list several approaches (e.g., public APIs and vulnerabilities like CVE-2018-4322) to uniquely identify the Apple device even after a system rebooting or resetting. They’ll also present advanced algorithms and vulnerabilities (e.g., CVE-2018-4321) to associate Apple device through deterministic user IDs (e.g., Apple IDs and phone numbers) and probabilistic data (e.g., device names, coordinate information, and IP addresses). Last, but not least, you’ll discuss feasible solutions (e.g., instrumentation and differential privacy) to prevent unique identification and cross-device tracking.
Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.