In February 2019 after the release of iOS 12.1.4 Google disclosed that this update fixes two vulnerabilities in iOS that Google has found being used in the wild as part of a remote 0-day iOS jailbreak. That iOS exploitation chains are caught in the wild is a rare thing, because the locked down nature of iOS makes it nearly impossible for defenders to see what is going on inside their iPhone which makes it hard to impossible to catch these attacks. Unfortunately Google did not share the exploitation samples or any further information about the exploit, the attack or the suspected attackers. This has made many iOS security researchers curious about the exact nature of the attack and started multiple parties to use patch diffing techniques to re-discover the vulnerabilities in Apple’s update.
In this talk we will discuss the whole process of how we discovered the vulnerabilities within the update and how we developed exploits for each of these vulnerabilities and how we eventually combined these exploits into an iOS jailbreak. The audience will not only take away a detailed process description but also a copy of the jailbreak itself.