Have you ever wanted to know how jailhreak tools work and iOS Hackers try to exploit the iOS Kernel? I Have!
Searching at Google I found this presentation of Stefan Esser (i0n1c) which is awesome. It describes how these hacks work, how to find exploits, exploitation types and much more!
From his speech:
“The iPhone user land is locked down very tightly by kernel level protections. Therefore any sophisticated attack has to include a kernel exploit in order to completely compromise the device. Because of this our previous session titled “Targeting the iOS Kernel” already discussed how to reverse the iOS kernel in order to find kernel security vulnerabilities. Exploitation of iOS kernel vulnerabilities has not been discussed yet.”
The presentation is from the BlackHat Security Conference that took place in Las Vegas