<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>bazad.github.io</title>
		<description>Brandon Azad's security blog</description>
		<link>https://bazad.github.io/</link>
		<atom:link href="https://bazad.github.io/feed.xml" rel="self" type="application/rss+xml"/>
		<pubDate>Wed, 05 Aug 2020 21:08:54 +0000</pubDate>
		<lastBuildDate>Wed, 05 Aug 2020 21:08:54 +0000</lastBuildDate>
		
		<item>
			<title>An introduction to exploiting userspace race conditions on iOS</title>
			
			<description>XPC service vulnerabilities are a convenient way to elevate privileges and/or evade the sandbox. This post will look at a race condition in GSSCred on macOS and iOS.
</description>
			
			<pubDate>Fri, 09 Nov 2018 04:45:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/11/introduction-userspace-race-conditions-ios/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/11/introduction-userspace-race-conditions-ios/</guid>
			
			<category>iOS</category>
			
			<category>macOS</category>
			
		</item>
		
		<item>
			<title>Bypassing platform binary restrictions with task_threads()</title>
			
			<description>Apple introduced a mitigation against the use of task ports in exploits. In this post we examine the mitigation, find a loophole, and develop a new code injection library.
</description>
			
			<pubDate>Wed, 24 Oct 2018 04:05:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/10/bypassing-platform-binary-task-threads/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/10/bypassing-platform-binary-task-threads/</guid>
			
			<category>iOS</category>
			
		</item>
		
		<item>
			<title>iOS privilege escalation via crashing</title>
			
			<description>Blanket is an exploit for CVE-2018-4280, a Mach port replacement vulnerability in launchd, that can be used to take control of every process on an iOS device. iOS versions up to and including 11.4 are vulnerable, but the exploit is specific to iOS 11.2.6.
</description>
			
			<pubDate>Tue, 25 Sep 2018 00:00:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/09/ios-privilege-escalation-via-crashing/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/09/ios-privilege-escalation-via-crashing/</guid>
			
			<category>iOS</category>
			
		</item>
		
		<item>
			<title>Reading process memory using XPC strings</title>
			
			<description>The discovery and analysis of CVE-2018-4248, a vulnerability in Apple's libxpc library that could be used to read out-of-bounds heap data from certain XPC services, including diagnosticd.
</description>
			
			<pubDate>Mon, 09 Jul 2018 21:32:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/07/xpc-string-leak/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/07/xpc-string-leak/</guid>
			
			<category>iOS</category>
			
			<category>macOS</category>
			
		</item>
		
		<item>
			<title>Analyzing the iOS 12 kernelcache's tagged pointers</title>
			
			<description>Apple introduced a new kernelcache format for iOS 12 that includes what appear to be tagged kernel pointers. In this post I examine changes in the kernelcache layout and show what those tags represent to lay the groundwork for future iOS 12 kernelcache analysis.
</description>
			
			<pubDate>Wed, 20 Jun 2018 15:35:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/06/ios-12-kernelcache-tagged-pointers/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/06/ios-12-kernelcache-tagged-pointers/</guid>
			
			<category>iOS</category>
			
		</item>
		
		<item>
			<title>How to build an iOS command line tool with Xcode 9.3</title>
			
			<description>When developing exploits or working on jailbroken devices, it's often useful to build command-line tools for iOS. While the Xcode UI does not support this, I'll document a workaround that can be used to build standalone Mach-O binaries for iOS with Xcode.
</description>
			
			<pubDate>Mon, 23 Apr 2018 22:40:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/04/xcode-command-line-targets-ios/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/04/xcode-command-line-targets-ios/</guid>
			
			<category>Xcode</category>
			
			<category>iOS</category>
			
		</item>
		
		<item>
			<title>Designing an advanced kernel function call primitive on iOS</title>
			
			<description>An explanation of the design process of the jump-oriented programs used by libmemctl to call kernel functions on iOS 11.1.2.
</description>
			
			<pubDate>Sat, 07 Apr 2018 22:45:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/04/ios-advanced-kernel-call-jop/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/04/ios-advanced-kernel-call-jop/</guid>
			
			<category>iOS</category>
			
			<category>memctl</category>
			
		</item>
		
		<item>
			<title>Who put that kernel pointer in my crash log?</title>
			
			<description>In February 2018 I noticed that kernel pointers were showing up in register x18 of iOS crash logs. Figuring out why took me all the way back to the Meltdown vulnerability and the buggy fix that made it trivial to bypass Apple's kernel ASLR defense.
</description>
			
			<pubDate>Fri, 06 Apr 2018 17:15:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/04/kernel-pointer-crash-log-ios/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/04/kernel-pointer-crash-log-ios/</guid>
			
			<category>iOS</category>
			
		</item>
		
		<item>
			<title>Reconstructing C++ classes in the iOS kernelcache using IDA Pro</title>
			
			<description>The ida_kernelcache IDA Pro toolkit now supports autogenerating class structs based on memory access patterns.
</description>
			
			<pubDate>Tue, 06 Mar 2018 23:00:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/03/ida-kernelcache-class-reconstruction/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/03/ida-kernelcache-class-reconstruction/</guid>
			
			<category>iOS</category>
			
		</item>
		
		<item>
			<title>CVE-2017-13868: A fun XNU infoleak</title>
			
			<description>The discovery and exploitation of CVE-2017-13868, a race condition in XNU leading to the disclosure of uninitialized kernel heap data.
</description>
			
			<pubDate>Sat, 03 Mar 2018 02:00:00 +0000</pubDate>
			<link>https://bazad.github.io/2018/03/a-fun-xnu-infoleak/</link>
			<guid isPermaLink="true">https://bazad.github.io/2018/03/a-fun-xnu-infoleak/</guid>
			
			<category>iOS</category>
			
			<category>macOS</category>
			
		</item>
		
		<item>
			<title>Live kernel introspection on iOS</title>
			
			<description>A live kernel memory inspection tool to aid in analyzing vulnerabilities and modifying the kernel.
</description>
			
			<pubDate>Fri, 15 Sep 2017 23:00:00 +0000</pubDate>
			<link>https://bazad.github.io/2017/09/live-kernel-introspection-ios/</link>
			<guid isPermaLink="true">https://bazad.github.io/2017/09/live-kernel-introspection-ios/</guid>
			
			<category>memctl</category>
			
			<category>iOS</category>
			
			<category>macOS</category>
			
		</item>
		
		<item>
			<title>physmem: Accessing Physical Memory from User Space on OS X</title>
			
			<description>Exploiting a logic bug in IOKit to directly access physical memory from user space.
</description>
			
			<pubDate>Mon, 16 Jan 2017 18:08:00 +0000</pubDate>
			<link>https://bazad.github.io/2017/01/physmem-accessing-physical-memory-os-x/</link>
			<guid isPermaLink="true">https://bazad.github.io/2017/01/physmem-accessing-physical-memory-os-x/</guid>
			
			<category>CVE-2016-1825</category>
			
			<category>CVE-2016-7617</category>
			
			<category>macOS</category>
			
		</item>
		
		<item>
			<title>Mac OS X Privilege Escalation via Use-After-Free: CVE-2016-1828</title>
			
			<description>Exploiting a use-after-free vulnerability in the OS X kernel to elevate privileges on Yosemite.
</description>
			
			<pubDate>Tue, 17 May 2016 22:00:00 +0000</pubDate>
			<link>https://bazad.github.io/2016/05/mac-os-x-use-after-free/</link>
			<guid isPermaLink="true">https://bazad.github.io/2016/05/mac-os-x-use-after-free/</guid>
			
		</item>
		
	</channel>
</rss>
