Тёмный

Nullcon Berlin 2024 | Fuzzing At Mach Speed: Uncovering IPC Vulnerabilities On MacOS By Dillon 

nullcon
Подписаться 12 тыс.
Просмотров 270
50% 1

Abstract
This research presents an in-depth investigation of macOS Inter-Process Communication (IPC) security, with a focus on Mach message handlers. It explores how Mach message handlers are utilized to execute privileged RPC-like functions and how this introduces vectors for sandbox escapes and privilege escalations. This involves a detailed examination of macOS internals, particularly the calling and processing of Mach messages, their data formats, and statefulness.
The core of the study is the development and application of a custom fuzzing harness targeting these identified IPC function handlers. The fuzzing process, aimed at inducing crashes indicative of memory corruption vulnerabilities, is discussed in detail. Several generated crashes will be discussed, one of which may be exploitable to obtain remote code execution. The research culminates in the open-sourcing of a bespoke Mach message corpus generation script and custom fuzzing harness, contributing to the broader cybersecurity community and laying the groundwork for future exploration in this area.
#MacOS #IPC #SecurityResearch #PrivilegeEscalation
Know more - nullcon.net/be...
Download Presentation: berlin2024.nul...
----------------
Follow Nullcon on Facebook: / nullcon
X: / nullcon
LinkedIn: / posts
Website: nullcon.net/

Опубликовано:

 

1 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
МАЛОЙ ГАИШНИК
00:35
Просмотров 342 тыс.
Weird Mac OSX Developer Previews
23:31
Просмотров 88 тыс.
Windows Privilege Escalation for Beginners
3:11:45
Просмотров 102 тыс.