TyphoonCon
  • About
    • About Us
    • Venue
    • Sponsorship
    • Press
    • Code Of Conduct
    • Contact
    • COVID-19 Regulations
    • Past events
      • TyphoonCon 2022
      • TyphoonCon Capture The Flag 2021
      • TyphoonCon Capture The Flag 2021 Write Ups
      • TyphoonCon 2020
      • TyphoonPWN 2020
      • TyphoonCon 2019
  • Conference
    • 2023 Speakers
    • Call for Papers 2023
  • Training
    • Introduction to hard target internals
    • Attacking the Linux Kernel
  • TyphoonPWN
BUY TICKETS

TYPHOONCON 2020 SPEAKER

Ben Sparks

TyphoonCon 2020 Speaker

Ben Sparks

TyphoonCon 2020 Speaker

Ben Sparkes (@iBSparkes) is an independent security researcher studying iOS/macOS and XNU

He has been active in the jailbreaking scene, writing jailbreaks such as Meridian and Totally Not Spyware, and is now primarily focused on iOS kernel vulnerability anaylsis and exploitation.

 

TyphoonCon 2020 Training

Ben Sparks | Independent security researcher
Location: Courtyard by Marriott Seoul Namdaemun, Seoul, Korea
Title: Diffing the iOS Kernel: Getting LPE the Easy Way
Date: June 18th, 2020

BIO

Ben Sparkes (@iBSparkes) is an independent security researcher studying iOS/macOS and XNU. He has been active in the jailbreaking scene, writing
jailbreaks such as Meridian and Totally Not Spyware, and is now primarily focused on iOS kernel vulnerability analysis and exploitation.

LECTURE DETAILS

Performing research on Apple’s latest devices and iOS versions is not always a simple feat. We commonly rely on 1-day bugs burnt by Google’s Project Zero and other research teams to do our own analysis, or needing valuable and scarce 0-day exploits.

What if there is a simpler way to get kernel-level access? In this talk Ben will cover techniques for diffing the iOS kernel looking for vulnerabilities, using tools such as Diaphora and IDA, and will demonstrate how you can find and build your own kernel exploit using potentially unpublished 1-day bugs.

  • Facebook
  • Twitter
  • Linkedin
  • Email