Part 2 of the blog post:
Quote:
https://blog.ret2.io/2018/06/13/pwn2own-2018-vulnerability-discovery/
|
But there are several more relevant blog posts for those interested:
Timeless Debugging of Complex Software: Root Cause Analysis of a Non-Deterministic JavaScriptCore Bug
Quote:
https://blog.ret2.io/2018/06/19/pwn2own-2018-root-cause-analysis/
|
Weaponization of a JavaScriptCore Vulnerability: Illustrating the Progression of Advanced Exploit Primitives In Practice
Quote:
https://blog.ret2.io/2018/07/11/pwn2own-2018-jsc-exploit/
|
Cracking the Walls of the Safari Sandbox: Fuzzing the macOS WindowServer for Exploitable Vulnerabilities
Quote:
https://blog.ret2.io/2018/07/25/pwn2own-2018-safari-sandbox/
|
Exploiting the macOS WindowServer for root: Four Heap Sprays, Two Dangling Pointers, One Bitflip
Quote:
https://blog.ret2.io/2018/08/28/pwn2own-2018-sandbox-escape/
|
Apple's browser has its fair share of exploits too! That goes to the sixth and final post of the PWN2OWN series.