

In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.
In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.

Spotlight Deal:
iPad 7 On Sale for $249 [Deal]
Share Article:
Facebook, Twitter, LinkedIn, Email, Reddit, Digg, Delicious, StumbleUpon
Follow iClarified:
Facebook, Twitter, LinkedIn, Newsletter, App Store, YouTube
from iClarified - Apple News and Tutorials https://ift.tt/2UAAXYs
No comments:
Post a Comment