In today's video, we're discussing Keenlab's release of some important PAC (Pointer Authentication Codes) and Baseband information for iOS 12.x Jailbreak purposes especially on A12 devices (but not only). They've made publicly available the presentation they've held at the InfiltrateCon 2019 which talks in-depth about the new mitigation techniques introduced by Apple in A12 devices (iPhone XS, iPhone XS MAX, iPhone XR and the latest iPads). They are also discussing the implementation, possible exploitable flaws and Apple's fixes for previous methods. Keenlab also talks about the baseband module which turns out to be a good vector for getting remote code execution on iOS if exploited properly according to #Keenlab. Keenlab has demoed an iOS 12.2 / 12.1.3 Jailbreak for A12 devices during the conference.
Keenlab's research is important because it presents a lot of information about PAC and the baseband which is useful for security researchers and for Jailbreak purposes. While some information about PAC may be accessible on the ARMv8.3 data sheet, Apple has implemented PAC in their own interesting way, so Keenlab's presentation is rather useful for jailbreakers seeking to understand this relatively new mechanism introduced by Apple back in September 2018.
It's worth mentioning that Keenlab has not published neither their jailbreak nor their kernel exploit used in the #iOS 12.2 A12 #Jailbreak demo. Don't forget to subscribe to stay updated with the latest iOS and Jailbreak news!
▽ Resources ▽
▶ iOS 12.2 / 12.1.4 / 12.1.3 JAILBREAK WITH CYDIA ACHIEVED (KEENLAB JAILBREAK) | WHAT TO EXPECT?
▶ How to Install Unc0ver and Chimera JAILBREAK WITHOUT COMPUTER (NO PC) iOS 12.0 – 12.1.2
▶ iOS 12.1.4 / iOS 12.1.3 JAILBREAK GREAT NEWS: SANDBOX ESCAPE EXPLOIT RELEASED!
▶ AWESOME iOS 12 CYDIA TWEAKS: BEST FREE Tweaks to Install On iOS 12.0 – 12.1.2