Another one bites the Apple! / (ramses)Junho Jang
===
South Korea
Line 研究團隊 GrayHash
https://linecorp.com/en/pr/news/global/2018/31
CTF team: PLUS
興趣在haunting
apple app: safari app store facetime
poc source code
https://github.com/binspecta/hitcon2019
Target:
Web browser: Safari
safari:
how to exploit with browswer
2 vuln, need: information leac + PC control
1.Arbitrary read/write by Javascript memory structure
2.Arbitrary code execution
leak from ios 12.2
RegExp analysis
- 起因: Safari 在處理 RegExp 的 back reference (`\<num>`)的實作有 bug
find the bugs from fuzzing
3 個因素:
- 環境Environment
- 用工具 Verda,可以一直開 VM。
- 400 CPUs for fuzzing
- 使用docker 做大規模佈署
- 目標Target
- JavaScriptCore with ASan
- 框架framework
- fuzzManger
- fuzzzing Safari 工具
crash analysis
kernel bug -demo
cve-2019-8576 (Heap buffer overflow in Kernel memory)
XNU(X is not in Unix)
**jsfunfuzz**
**Fuzz manager**
###### tags: `HITCONCMT2019`,`HITCONCMT`,`HITCON`