Friday, 7 February 2020

New 'OOB Timestamp' Exploit Released for A12/A13 Devices on iOS 13 - 13.3



A new exploit for A12 and A13 devices running iOS 13.0 to iOS 13.3 has been released by Brandon Azad.

In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.

In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.





Spotlight Deal:
iPad 7 On Sale for $249 [Deal]

Share Article:
Facebook,  Twitter,  LinkedIn,  Email,  Reddit,  Digg,  Delicious,  StumbleUpon

Follow iClarified:
Facebook,  Twitter,  LinkedIn,  Newsletter,  App Store,  YouTube



from iClarified - Apple News and Tutorials https://ift.tt/2UAAXYs

No comments:

Post a Comment