ronka

31 posts

ronka

ronka

@epsilan

Katılım Ekim 2011
316 Takip Edilen194 Takipçiler
ronka
ronka@epsilan·
@xnyhps that's really unfortunate. it seems it was lost in the chaos somewhere. to add more ASB data: my disclosure to bounty timeline was 10 months starting in january
English
1
0
1
0
Thijs Alkemade
Thijs Alkemade@xnyhps·
@epsilan This was such a rollercoaster… “Huh. That’s the same place where I found something.” “Getting really close now..” “THAT’S THE SAME BUG AND APPLE HASN’T EVEN SENT ME AN UPDATE IN 14 F%^*+$ MONTHS.” “They did WHAT to fix it?” “My payloads are slightly different. It still works!”
English
1
0
0
0
ronka
ronka@epsilan·
#OBTS was just surreal. many thanks to everyone for the warm reception, you can find my slides detailing the story behind 5 app/macro sandbox escapes stemming from one root cause here: github.com/ronwai/talks/b…
ronka tweet media
English
3
9
39
0
ronka retweetledi
Objective-See Foundation
Objective-See Foundation@objective_see·
Ron Waisberg (@epsilan) of @okta, detailing a lovely a logic vulnerability he discovered in LaunchServices (CVE-2021-30677) and creative ways to reliable exploit it! 🙌🏽 #OBTS If you're not on the conference live stream, you're missing out! Join us: youtube.com/watch?v=7JnklV… 🎥
YouTube video
YouTube
Objective-See Foundation tweet media
English
1
9
26
0
ronka
ronka@epsilan·
@durumcrustulum @0xmachos @patrickwardle good find. this should have the envvar ignored but testing on 5.17.2 I'm not seeing that behaviour and I'm dropped into a node interpreter 🤔
English
1
0
1
0
Csaba Fitzl
Csaba Fitzl@theevilbit·
@ClassicII_MrMac I wonder if Monterey will be out soon and they will add CVEs to the advisory once they release the advisory for the initial version of Monterey. 🤔
English
1
0
3
0
ronka
ronka@epsilan·
Big Sur 11.5 fixed and assigned CVE-2021-30783 to a bug of mine in just under 2mo from report. Can't wait to share details about this bug and CVE-2021-30677 at @objective_see's #OBTS v4 !! Get your palms ready for your faces :))
English
0
0
8
0
ronka
ronka@epsilan·
honoured to speak alongside so many brilliant folks at #OBTS v4 #Environmental%20Disaster" target="_blank" rel="nofollow noopener">objectivebythesea.com/v4/talks.html#… see y'all in Maui!! 🏖️🌴
English
0
1
3
0
ronka
ronka@epsilan·
CVE-2021-33765 is an Installer spoofing bug and variant of CVE-2021-26413 where a batch command is placed in CFB unallocated bytes of an Installer file (preserving the signature) and cmd.exe optimistically interprets one line at a time without exiting early
ronka tweet media
English
0
0
4
0
Adam Chester 🏴‍☠️
How are people using the MacOS Monterey beta on M1, really don’t wanna install it on base if I can help it.
English
1
1
7
0
ronka
ronka@epsilan·
@xnyhps Yikes... so 6mo+ later that other bug is still unpatched
English
0
0
1
0
Thijs Alkemade
Thijs Alkemade@xnyhps·
@epsilan Yes, this is different. We did refer to this one as part of the vulnerable updaters, but at the time of recording it was not yet fixed, so it was the “unnamed company”.
English
1
0
1
0
ronka
ronka@epsilan·
@xnyhps thanks for sharing, Thijs 🙏 is this bug separate from the process injection bug described at the end of your presentation?
English
1
0
1
0
Thijs Alkemade
Thijs Alkemade@xnyhps·
So I had a sandbox escape with privilege escalation in one exploit: create new app, unquarantine it, move it over MRT.app and wait for a reboot! 🥳
English
1
0
6
0
ronka
ronka@epsilan·
@aionescu thanks Alex!! and if you're referring to my profile pic (which admittedly does look a lot like Mont Royal) it's actually Chapultepec Castle in Mexico City :)) hopefully we'll be back in mtl soon enough 🤞
English
1
0
0
0
ronka
ronka@epsilan·
@thracky thank you John!! hopefully enough details in here to make for an easy report :P
English
0
0
0
0
Csaba Fitzl
Csaba Fitzl@theevilbit·
Are there any good ida plugins or scripts for Swift? And Obj-C?
English
2
0
5
0
ronka
ronka@epsilan·
here is an example of what class and protocol information can be discerned (easy NSXPC clients anyone??) shoutout to Steve Nygard for the excellent class-dump and Vincent for excellent disassembler!
ronka tweet mediaronka tweet media
English
0
0
0
0
ronka
ronka@epsilan·
hello world! for those reversing Big Sur, I wrote a Hopper (@bSr43) plugin to reconstruct ObjC runtime structures in the dyld_shared_cache. dePAC/import/analyze the names + types of ivars, properties, methods in classes & protocols: github.com/ronwai/dsctool
English
1
1
6
0