Pangu 9 Internals

by Tielei Wang, Hao Xu, Xiaobo Chen
Sept. 15, 2017 0 comments www.blackhat.com belen_caty Pen Testing & Audits

This talk will reveal the internals of Pangu 9. Specifically, this talk will first present a logical error in a system service that is exploitable by any container app through XPC communication to gain arbitrary file read/write as mobile. Next, this talk will explain how Pangu 9 gains arbitrary code execution outside the sandbox through the system debugging feature. This talk will then elaborate a vulnerability in the process of loading the dyld_shared_cache file that enables Pangu 9 to achieve persistent code signing bypass. Finally, this talk will present a vulnerability in the backup-restore process that allows apps signed by a revoked enterprise certificate to execute without the need of the user's explicit approval of the certificate.

https://www.blackhat.com/us-16/briefings.html#pangu-9-internals