Ian Beer
@i41nbeer
Followers
48K
Following
2
Media
2
Statuses
71
Joined December 2017
My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - https://t.co/H4m8MBwoWN
21
235
713
If you like memory corruption, low-level internals and building custom decompilers to analyse novel exploits check out the write-up here:
7
147
483
Earlier this year @AmnestyTech and @_clem1 from Google TAG found an in-the-wild iPhone zero day full chain. Today I’m publishing my analysis of the Safari sandbox escape component, the first in-the-wild sample to break into the new Safari GPU process.
5
112
399
This includes calling out failures and patch gapping is currently a major issue with Android. In this case, 5 Mali GPU vulnerabilities we reported this summer were fixed by ARM but those fixes still haven't made it to end user devices, many months later.
0
15
47
Mind the gap: https://t.co/sq6tw15Rmg Part of project zero's remit is to drive structural improvements across the ecosystem.
2
56
174
Check out Google's Threat Analysis Group's post which has more operational details:
blog.google
Today, alongside Google’s Project Zero, we are detailing capabilities provided by RCS Labs, an Italian vendor that uses a combination of tactics, including atypical drive-by downloads as initial...
0
14
73
Excited to publish my writeup of a novel iOS in-the-wild exploit: The curious case of the fake Carrier .app:
14
256
744
Continuing my look back at interesting vulnerabilities from last year here are some edited notes from my analysis of CVE-2021-1782, a rather subtle race condition vulnerability in the XNU vouchers subsystem found exploited in-the-wild last January:
5
73
255
It was a vulnerability in ASN.1 decoding which only existed in Apple's fork of NSS; I traced the code back over 20 years to figure out why.
0
12
65
Today we're publishing a follow-up post looking at the sandbox escape used by FORCEDENTRY:
15
219
589
Huge thanks to Citizen Lab for sharing a sample of the exploit and Apple for their invaluable technical assistance.
1
11
326
Today we're publishing a detailed technical writeup of FORCEDENTRY, the zero-click iMessage exploit linked by Citizen Lab to the exploitation of journalists, activists and dissidents around the world.
56
2K
4K
Excited to finally publish my lockdown project from earlier this year: an iOS zero-click radio proximity exploit odyssey. https://t.co/UXQvemH0hG
58
817
3K
I’d love to work with Apple to work out if this work qualifies for a bug bounty and donate that in full to charity!
7
6
190
Apple publishes their bug bounty reward guidelines publicly on their website and they’re applauded for having some of the highest in the industry.
security.apple.com
Your security research may be eligible for a reward through the Apple Security Bounty. We welcome reports from anyone.
2
7
106