Brandon Azad

37 posts

Brandon Azad

Brandon Azad

@_bazad

@[email protected]

Katılım Nisan 2018
0 Takip Edilen14.5K Takipçiler
Brandon Azad
Brandon Azad@_bazad·
I’m really excited for us to shed light on some really cool work we’ve been doing to harden the XNU allocator! This has been a huge effort by so many people, and I’m very proud of the direction: security.apple.com/blog/towards-t…
English
6
95
394
0
Brandon Azad
Brandon Azad@_bazad·
My teammates at Project Zero have been among the kindest and smartest people I've met, and I've learned so much from them. I'll really miss working alongside everyone on the team. Thank you all for these wonderful experiences, and keep on hacking!
English
11
19
329
0
Brandon Azad
Brandon Azad@_bazad·
It's with both bittersweet sadness and excitement that I say goodbye to Project Zero, as I'll be joining Apple next week to continue my work improving Apple device security. My time at Project Zero has been amazing, and it's been an honor to share in this wonderful mission.
English
117
133
1.2K
0
Brandon Azad
Brandon Azad@_bazad·
From A13 SecureROM. This isn't a security issue, since this particular bzero is only used to initialize the boot trampoline in SRAM. Even so, Apple appears to have addressed this in iBoot, hence the credit in the iOS 14 release notes. Always worth checking hand-rolled assembly.
Brandon Azad tweet media
English
7
78
427
0
Brandon Azad
Brandon Azad@_bazad·
Here are the slides from my BlackHat talk "iOS Kernel PAC, One Year Later", in which I consider how kernel PAC CFI has changed since its introduction in iOS 12 and examine 5 ways to bypass it in iOS 13: bazad.github.io/presentations/…
English
4
173
486
0
Brandon Azad
Brandon Azad@_bazad·
You can find the full PPL bypass at #c4" target="_blank" rel="nofollow noopener">bugs.chromium.org/p/project-zero…
English
0
19
67
0
Brandon Azad
Brandon Azad@_bazad·
The core of Apple is PPL: Attacking the XNU kernel's kernel. googleprojectzero.blogspot.com/2020/07/the-co… How to use an out-of-bounds read in PPL (Apple's kernel-within-the-kernel) to get a stale TLB entry for a page, allowing you to bypass PPL and map arbitrary physical addresses accessible at EL0.
Brandon Azad tweet media
English
8
176
511
0
Brandon Azad
Brandon Azad@_bazad·
One Byte to Rule Them All: An iOS 13 exploit technique that turns a one-byte kernel heap overflow into an arbitrary physical address mapping primitive, all while avoiding the kernel task port and sidestepping mitigations like PAC, KASLR, and zone_require. googleprojectzero.blogspot.com/2020/07/one-by…
English
12
253
712
0
Brandon Azad
Brandon Azad@_bazad·
iOS Kernel Pac, One Year Later #ios-kernel-pac-one-year-later-19726" target="_blank" rel="nofollow noopener">blackhat.com/us-20/briefing…
English
0
16
116
0
Brandon Azad
Brandon Azad@_bazad·
I'm excited to be sharing my latest research on iOS kernel Pointer Authentication at Black Hat USA 2020! One year ago, I published 5 ways to bypass iOS 12 kernel PAC. This year, we'll take a look at what's changed in iOS 13, once again concluding with 5 new ways to bypass PAC.
English
7
266
1.1K
0
Brandon Azad
Brandon Azad@_bazad·
Looks like iOS Pointer Authentication is getting per-process A keys.
Brandon Azad tweet media
English
1
41
234
0
Brandon Azad
Brandon Azad@_bazad·
New blog post on how I was able to find the 0-day used in unc0ver just 4 hours after it was released: googleprojectzero.blogspot.com/2020/07/how-to… Key takeaways: 1. Obfuscating an exploit doesn't hide the bugs. 2. Like SockPuppet, this bug could have been identified with simple regression tests.
English
8
309
922
0
Brandon Azad
Brandon Azad@_bazad·
Thanks to everyone for suggesting exploits missed in my initial survey! I updated the blog post to add an exploit for iOS 12.4.1, swap an exploit for iOS 12.1.2, and clarify the wording of some of the mitigations. Please do reach out with any more suggestions!
English
1
6
56
0
Brandon Azad
Brandon Azad@_bazad·
I've compiled a summary of every original public iOS kernel exploit from app context since iOS 10, describing the high-level exploit flow to get stable kernel read/write. The trends of how these exploits have evolved over time are quite interesting: googleprojectzero.blogspot.com/2020/06/a-surv…
English
14
377
1K
0
Brandon Azad
Brandon Azad@_bazad·
KTRW now has proper support for kernel debugging iOS 13. It uses checkra1n to insert an XNU kernel extension into the kernelcache before boot.
Brandon Azad tweet media
English
11
97
402
0
Brandon Azad
Brandon Azad@_bazad·
IDA 7.5 improves support for iPhone kernel debugging using KTRW! Breakpoints now work very nicely out of the box. Also, KTRW's iOS 13 support is in the works.
English
6
95
451
0
Brandon Azad
Brandon Azad@_bazad·
Unfortunately due to a recent injury I won’t be able to attend @nullcon. I’m hoping to still make it to #OBTS.
English
33
7
229
0
Brandon Azad
Brandon Azad@_bazad·
I'm excited to be presenting at both @nullcon and #OBTS this March. Come learn how I built KTRW, an iOS kernel debugger for production A11 iPhones, and how I used it to expose attack surface that led to the discovery of the oob_timestamp vulnerability.
English
4
19
163
0
Brandon Azad
Brandon Azad@_bazad·
For those interested in low-level analysis of Apple's A13 and associated kernel mitigations, here's a version of oob_timestamp with a PAC bypass for iOS 13.3. #c5" target="_blank" rel="nofollow noopener">bugs.chromium.org/p/project-zero…
English
15
140
493
0