DIY cable to build better iOS exploits

Powered by SC Magazine
 

Serial port gives access to a dormant kernel debugger.

An Aussie network engineer has developed a serial cable connector that can give access to a secret kernel debugger hidden within Apple iOS.

The debugger revealed by researcher Stefan Esser at the Black Hat conference last week was a dormant iOS function in Apple iPhones and iPads, carried over from Apple OS.

Esser told The Register that the debugger slashed exploit development time because it gave control over the operating system when it crashes, including read/write access to memory and the registeries.

Brisbane-based network adminstrator Chris Pollock has designed a serial connector capable of accessing the system, and has published the blueprints and photos on his blog.

He developed the system, which relies on a jailbroken device, to allow engineers to use the hidden serial port in Apple devices such as iPads and iPhones so they could be used in place of laptops in data centres.

US-based RedPark offers a similar system that does not require a jailbreak, but Pollock said it would not grant access to the debugger.

 

"There are limitations because the cable is powered by the serial," Pollock said. "It requires  external power."

Without external power, the serial port will not access the debugger.

Pollock's blueprints have been updated to show how his serial cable can be booted with a 3.3v external power source.

He had begun to further develop the devices but ceased once the RedPark cable, previously stalled from production for months, was accepted by Apple.

Copyright © SC Magazine, Australia


DIY cable to build better iOS exploits
Tags
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1032

Vote