0:00
what's going on YouTube GSN here today
0:02
we're discussing a brand new Kel exploit
0:04
that was released and this one is a very
0:06
special kind of iOS exploit because it
0:08
cannot fail it's the very first of its
0:11
kind so we're going to get straight into
0:13
it it was posted by Alfie a prominent
0:15
developer in our community who also
0:17
developed the troll installer X
0:19
application that allows you to install
0:20
troll store on I was 16 and 15 and stuff
0:22
like that and they've been involved with
0:24
the jilber community for quite some time
0:26
now a while back and they posted this
0:28
I've just published a new blog post
0:30
detailing how I developed a
0:31
deterministic kernel exploit for iOS
0:33
enjoy now a lot of people did not quite
0:35
know what this is at the moment because
0:37
it's well it's a kernel exploit sure but
0:39
what is a deterministic kernel exploit
0:42
we're going to get into that in a second
0:43
this video is brought to you by 8K SEC
0:45
they teach you how to find your own iOS
0:47
vulnerabilities develop your own iOS
0:49
exploits and build your own jailbreak if
0:51
you want to learn how iOS works this is
0:53
a great place to start if you intend to
0:55
start doing security research on iOS or
0:57
even develop jailbreak check them out in
0:59
the link below so AL posted this
1:01
complete write up over here it's called
1:02
Trion the exploit and it says Trion
1:05
developing a deterministic kernel
1:06
exploit for iOS and they go in depth
1:09
about the vulnerability used because
1:10
this one actually uses the same
1:12
vulnerability that we used in the past
1:14
it's a new exploitation technique if you
1:16
want making a very unstable exploit to
1:19
be bulletproof completely impossible to
1:21
fail that's what a deterministic exploit
1:24
is it's an exploit that cannot fail that
1:26
would never Panic your device never
1:28
cause it to reboot it will always
1:30
100% successfully exploited the device
1:32
on every tribe this is a first in the
1:35
gilbery community especially in this day
1:37
and age especially since the
1:38
vulnerability used in here the
1:40
vulnerability that was actually
1:41
exploited is essentially a memory
1:44
corruption memory Corruptions tend to be
1:46
pretty noisy tend to be pretty dirty
1:49
they would eventually Panic the device
1:51
because you can write in the wrong spot
1:54
in the wrong moment which would cause
1:56
the entire device to panic and reboot
1:57
however the way Alfie did in this
2:00
version of his exploit for this iOS
2:01
vulnerability is actually quite great
2:03
because being deterministic it means
2:05
that it cannot fail and this unlocks a
2:08
very interesting method of exploiting
2:10
iOS vulnerabilities so yes if you want
2:12
to check it out definitely go ahead this
2:14
could be very useful for the Gil
2:16
Community especially if we can apply
2:17
this kind of technique to newer or other
2:19
vulnerabilities in the future very
2:21
interesting stuff I went through the
2:23
write up and it's actually quite great
2:25
it's worth a read I will link it down
2:27
below and um yeah if you are looking
2:28
actually for Gil tools if you're here
2:31
not for the news or for the research but
2:32
rather for the tools you go ahead here
2:34
on ivice central.com my website you go
2:37
here to jailbreak tools and here you can
2:38
find a list with all the currently
2:40
available Gill breaks if it's not here
2:42
it doesn't exist so that's where you
2:44
find all the available Gill breaks and
2:46
it is updated regularly so thank you for
2:48
watching I am GSN till the next time
2:50
subscribe to stay updated and peace out