View Single Post
  #2  
Old 08-31-2018, 08:49
chants chants is offline
VIP
 
Join Date: Jul 2016
Posts: 737
Rept. Given: 37
Rept. Rcvd 48 Times in 30 Posts
Thanks Given: 671
Thanks Rcvd at 1,064 Times in 482 Posts
chants Reputation: 48
Part 2 of the blog post:
Quote:
https://blog.ret2.io/2018/06/13/pwn2own-2018-vulnerability-discovery/
But there are several more relevant blog posts for those interested:

Timeless Debugging of Complex Software: Root Cause Analysis of a Non-Deterministic JavaScriptCore Bug
Quote:
https://blog.ret2.io/2018/06/19/pwn2own-2018-root-cause-analysis/
Weaponization of a JavaScriptCore Vulnerability: Illustrating the Progression of Advanced Exploit Primitives In Practice
Quote:
https://blog.ret2.io/2018/07/11/pwn2own-2018-jsc-exploit/
Cracking the Walls of the Safari Sandbox: Fuzzing the macOS WindowServer for Exploitable Vulnerabilities
Quote:
https://blog.ret2.io/2018/07/25/pwn2own-2018-safari-sandbox/
Exploiting the macOS WindowServer for root: Four Heap Sprays, Two Dangling Pointers, One Bitflip
Quote:
https://blog.ret2.io/2018/08/28/pwn2own-2018-sandbox-escape/
Apple's browser has its fair share of exploits too! That goes to the sixth and final post of the PWN2OWN series.
Reply With Quote
The Following User Says Thank You to chants For This Useful Post:
tonyweb (08-31-2018)