Ian Beer’s MOSEC 2018 Presentation Slides Released To Public

If you are interested in security research, a keen jailbreaker, or just someone who follows the activity of the jailbreak community, then the chances are that you have heard of Ian Beer.

If so, you may be interested to know that the Project Zero researcher has released his MOSEC 2018 presentation slides for all to download and consume.

We’ve known for quite some time that Ian was going to be talking at this year’s MOSEC meeting in Shanghai. And, in all honesty, given his position within Google’s Project Zero, as well as the contributions that he has made to both the security and jailbreak scenes, he was a perfect individual to discuss his experience and deliver his pre-prepared talk titled “build your own iOS kernel debugger.

Of course, most of us will know Beer from his work discovering vulnerabilities in the iOS platform at a kernel level, which makes this the perfect topic of discussion for his particular skillset.

For those who actually want to download his MOSEC 2018 presentation slides, it’s probably worth mentioning that you will need to have a decent understanding of security research, including the internals of machines and devices, and how they work to truly understand what’s actually being discussed in the slides here.

The concept of the presentation appears to be showing how it’s possible to trigger an infinite loop within the core of Apple’s iOS platform, intercepting that loop and then using that work to put together a bespoke debugger that would work on all stock iOS-powered devices. This debugger is likely what forms the basis of his work and how he actually manages to be so proficient when it comes to finding and exploiting bugs within Apple’s ecosystem.

The slides are extremely interesting but it’s really the “conclusion” at the end which will pique a lot of interest. Beer has hypothesized that if his debugger is taken a little bit further and expanded beyond his own use case, then it could be possible to “steal whatsapp/wechat/etc messages, log GPS etc,” which is extremely concerning.

If this type of research and information interests you, then you can download and trawl through the 77-page presentation right here.

(Source: @i41nbeer [Twitter])

You may also like to check out:

You can follow us on Twitter, add us to your circle on Google+ or like our Facebook page to keep yourself updated on all the latest from Microsoft, Google, Apple and the Web.