ATTENTION, THIS COURSE IS CURRENTLY ONLY AVAILABLE TO STUDENTS FROM THE FOLLOWING COUNTRIES:
EU, Norway, Switzerland, Canada, USA, New Zealand, Australia or Japan
For the last few years we have taught iOS and OS X/MacOS kernel exploitation to a wide variety of students. Techniques and vulnerabilities discussed in our training have been instrumental in the creation of several public jailbreaks between iOS 7 and iOS 10. Our previous trainees can also be seen reporting vulnerabilities to Apple these days.
The course has been under constant development for years, because Apple keeps adding new security mitigations into the kernel or changes how security relevant implementations like the kernel heap work. For 2018 we will have reworked the material again to cover the latest security changes in iOS 11 and the successor of the iPhone 7. We have also improved the software tools that we use during exploit development.
In comparison to previous years we have more hands on tasks covering real kernel vulnerabilities that were made public during 2017.
During the training, we will make devices availiable on iOS 10 to perform the hands on tasks, because they can only be performed on devices having vulnerabilities. However we will also demonstrate our tools working on iOS 11 devices.
Each class has prerequisites for software loads and a laptop is mandatory. These individual class guides will list material the students are expected have knowledge about coming in and software tools that need to be pre-installed before attending so you get the maximum benefit from the focused intermediate or advanced level course.
Please pay particular attention to the prerequisites, as the material listed there will not be reviewed in the courses, and will be necessary to get the maximum benefit out of these educational programs.
Due to Wassenaar export control on technology for development of intrusion software any kind of exploitation training against hardened targets is export controlled. We therefore can only accept students from:
EU, Norway, Switzerland, Canada, USA, New Zealand, Australia or Japan
Stefan Esser is best known in the security community as the PHP security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like CVS, Samba, OpenBSD or Internet Explorer. In 2003 he was the first to boot Linux directly from the hard disk of an unmodified XBOX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to develop a more secure version of PHP, known as Hardened-PHP, which evolved into the Suhosin PHP Security System in 2006. Since 2007 he works as head of research and development for the German web application company SektionEins GmbH that he co-founded. In 2010 he did his own ASLR implementation for Apple’s iOS and shifted his focus to the security of the iOS kernel and iPhones in general. Since then he has spoken about the topic of iOS security at various information security conferences around the globe. In 2012 he co-authored the book the iOS Hackers Handbook.