Skip to content

Instantly share code, notes, and snippets.

@ninjaprawn
Last active October 9, 2015 08:33
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save ninjaprawn/15c4d9ff0b48a460f516 to your computer and use it in GitHub Desktop.
Save ninjaprawn/15c4d9ff0b48a460f516 to your computer and use it in GitHub Desktop.
My terrible attempt at trying to find exploits for iOS

INTRO

Yeah, just want to mess around. Mainly trying to use bugs/vulns revealed by apple in ios patches (e.g. CVE-2012-3726 from https://support.apple.com/en-au/HT202615) Using my iPod 4, downgraded to ios 4.

BUT FIRST

Need to know how the exploit stuff works, and how to find them w/o using existing, patched vulns. Main type: buffer overflow. Data usually has a fixed memory size in which it is allocated (only that variable can currently use that space). Buffer overflow is when there are more bytes than the allocated space, causing memory to overflow into other memory. We can manipulate the string so that the data after the memory limit can override the variables and potentially run code. (need to see how to data out of the memory limit is structured and created)

Example: (formatting weird, will add when updating. see the link below)

The example above is from wikipedia (https://en.wikipedia.org/wiki/Stack_buffer_overflow#Exploiting_stack_buffer_overflows). This is a very basic version of a buffer overflow. If the string called is longer than 12 characters, it goes over the set memory.

(not posting exploiting this as i have no clue what i am doing)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment