Ian Beer Profile
Ian Beer

@i41nbeer

Followers
48K
Following
2
Media
2
Statuses
71

Joined December 2017
Don't wanna be here? Send us removal request.
@i41nbeer
Ian Beer
7 months
My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - https://t.co/H4m8MBwoWN
21
235
713
@i41nbeer
Ian Beer
2 years
If you like memory corruption, low-level internals and building custom decompilers to analyse novel exploits check out the write-up here:
7
147
483
@i41nbeer
Ian Beer
2 years
Earlier this year @AmnestyTech and @_clem1 from Google TAG found an in-the-wild iPhone zero day full chain. Today I’m publishing my analysis of the Safari sandbox escape component, the first in-the-wild sample to break into the new Safari GPU process.
5
112
399
@i41nbeer
Ian Beer
3 years
This includes calling out failures and patch gapping is currently a major issue with Android. In this case, 5 Mali GPU vulnerabilities we reported this summer were fixed by ARM but those fixes still haven't made it to end user devices, many months later.
0
15
47
@i41nbeer
Ian Beer
3 years
Mind the gap: https://t.co/sq6tw15Rmg Part of project zero's remit is to drive structural improvements across the ecosystem.
2
56
174
@i41nbeer
Ian Beer
3 years
Excited to publish my writeup of a novel iOS in-the-wild exploit: The curious case of the fake Carrier .app:
14
256
744
@i41nbeer
Ian Beer
4 years
Continuing my look back at interesting vulnerabilities from last year here are some edited notes from my analysis of CVE-2021-1782, a rather subtle race condition vulnerability in the XNU vouchers subsystem found exploited in-the-wild last January:
5
73
255
@i41nbeer
Ian Beer
4 years
It was a vulnerability in ASN.1 decoding which only existed in Apple's fork of NSS; I traced the code back over 20 years to figure out why.
0
12
65
@i41nbeer
Ian Beer
4 years
I wrote up some of my notes on interesting vulnerabilities from last year. This first one takes a deep-dive into the iOS ASN.1 vulnerability found by @xerub:
6
142
428
@i41nbeer
Ian Beer
4 years
Today we're publishing a follow-up post looking at the sandbox escape used by FORCEDENTRY:
15
219
589
@i41nbeer
Ian Beer
4 years
Huge thanks to Citizen Lab for sharing a sample of the exploit and Apple for their invaluable technical assistance.
1
11
326
@i41nbeer
Ian Beer
4 years
Today we're publishing a detailed technical writeup of FORCEDENTRY, the zero-click iMessage exploit linked by Citizen Lab to the exploitation of journalists, activists and dissidents around the world.
56
2K
4K
@i41nbeer
Ian Beer
5 years
CVE-2020-27932: iOS Kernel privesc with turnstiles:
33
221
843
@i41nbeer
Ian Beer
5 years
The rest of this thread:
@i41nbeer
Ian Beer
5 years
I’d like to give some personal opinions on this work. The following thread is my personal view and doesn’t necessarily reflect the views of Project Zero or Google.
2
18
139
@i41nbeer
Ian Beer
5 years
(twitter UI is complicated!)
4
1
94
@i41nbeer
Ian Beer
5 years
Excited to finally publish my lockdown project from earlier this year: an iOS zero-click radio proximity exploit odyssey. https://t.co/UXQvemH0hG
58
817
3K
@i41nbeer
Ian Beer
5 years
With Apple’s generous donation matching commitment that could be up to $500,000. Let’s make this a great celebration of our work together towards a better future. #GivingTuesday @bbcnews @guardian @nytimes @ft @vice @WIRED
8
19
345
@i41nbeer
Ian Beer
5 years
I’d love to work with Apple to work out if this work qualifies for a bug bounty and donate that in full to charity!
7
6
190
@i41nbeer
Ian Beer
5 years
Apple publishes their bug bounty reward guidelines publicly on their website and they’re applauded for having some of the highest in the industry.
Tweet card summary image
security.apple.com
Your security research may be eligible for a reward through the Apple Security Bounty. We welcome reports from anyone.
2
7
106