0:00
what's going on youtube geos9 here so in
0:02
today's video i have an important video
0:04
which will clarify some information
0:06
about something that was released
0:08
recently so yesterday's an active posted
0:10
here on twitter quote interested in mac
0:12
os or ios xpc exploitation this
0:15
developer just published a detailed
0:17
solution to alice cdf so this one here
0:20
sandbox share challenge with a reliable
0:22
exploit of course a lot of people ask me
0:24
if this can be used for jailbreak
0:26
purposes since they read ios and of
0:28
course sandbox and exploiting here so in
0:30
this video we're going to talk about
0:31
this and what it is and of course what
0:33
it can be used for so as you can see if
0:35
you open the article in here we get a
0:37
whole write up about everything that's
0:39
going on here how it works the code and
0:41
they even posted the code here on github
0:44
which is basically sandbox share and
0:45
says the detailed complete solution can
0:47
be found on synaptive blog which is this
0:50
one here so at first let's start with
0:52
what is a cdf a cdf is capture the flag
0:55
it's basically a challenge in the
0:57
infosec world if you want to prove that
1:00
you can pawn a specific system or you
1:02
can pawn a specific program then you
1:04
will of course complete a cdf and the
1:06
flag is usually either being able to
1:09
read and write a specific file or to get
1:11
a specific code which normally you
1:13
wouldn't have access to and that one
1:15
proves the fact that you successfully
1:17
hacked the system so these are like if
1:19
you want games for hackers in order to
1:21
prove what they know to prove their
1:23
skills so this one appears to be for ios
1:25
and mac os it's sandbox share in here so
1:28
it's xbc exploitation and they did post
1:30
a full exploit here the code is
1:32
available all the way here but many
1:34
people ask me whether this can be used
1:36
for jailbreak purposes and unfortunately
1:38
the answer might be no while there might
1:40
be things usable here this is basically
1:43
a solution for a cdf or some sort of
1:46
contest or if you want a game or a
1:48
challenge while this is indeed real
1:50
pawning and a real exploit it's actually
1:52
not a sandbox escape exploit which means
1:55
that it's definitely not very good for
1:56
jailbreak purposes even though it's very
1:59
detailed in here now the information
2:01
present in the thread up can be useful
2:03
for a jailbreak developer in order to
2:05
understand the idea behind it and
2:07
possibly exploit it for their own
2:09
purpose and that is of course for
2:10
jailbreak reasons but even if they do
2:12
and let's say they managed to do some
2:14
sort of sandbox escape rather than
2:16
sandbox sharing in here that still
2:18
probably wouldn't go very far however in
2:20
this case the only thing that can be
2:22
done with this exploit is to read the
2:24
flag which is this one in here which
2:26
says alice good job mac ports are really
2:29
cool aren't they so this is basically
2:31
contained somewhere where you wouldn't
2:32
have access normally and using this
2:34
exploit that you have to write which of
2:36
course you have to know how to do you
2:37
would be able to read that file that you
2:39
normally wouldn't have access to it is
2:42
indeed pretty neat and it does prove
2:43
that you were able to successfully hack
2:45
the system being it ios or macos which
2:48
again is great and publishing here the
2:50
solution is also great for those who
2:52
want to learn but this may not be very
2:54
useful for jailbreak purposes because
2:56
it's a very very specific scenario where
2:58
you basically hack a very particular
3:00
system containing that flag so not
3:03
really applicable in the real world with
3:05
you know a sandbox escape or something
3:07
like that and even if you manage to get
3:08
a sandbox escape for say
3:11
14.7.1 or 14.7 14.6 14.5 and so on it's
3:15
still just a sandbox escape even at that
3:18
point you will only be able to just
3:20
escape your sandbox not to get rude not
3:22
to remount the file system not to run
3:25
any code at kernel level just to access
3:28
files outside of your sandbox which is
3:30
cool but not enough for a jailbreak so
3:32
watching active posted doesn't have to
3:34
do anything with jailbreaking even
3:36
though it says in here ios and mac os
3:38
xpc exploitation and sandbox it's just a
3:41
great writer for a cdf a great one as i
3:44
said but it's not related to
3:45
jailbreaking and it's probably not very
3:47
useful for that matter so i really
3:48
wanted to make this clear because a lot
3:50
of people asked me on twitter and here
3:52
on the channel what that is that has
3:54
been released and of course whether we
3:56
can use it so i hope that this clears it
3:58
up it's not what we're looking for is
4:00
just the solution for a capture the flag
4:02
challenge which of course happens to be
4:04
on ios and mac os but it's not really
4:06
useful in the real world so yeah thank
4:08
you for watching i am geo snow till the