ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

37C3 - Apple's iPhone 15: Under the C

Автор: media.ccc.de

Загружено: 2024-01-31

Просмотров: 44335

Описание: https://media.ccc.de/v/37c3-12074-app...

Hardware hacking tooling for the new iPhone generation

Hardware hacking tooling for the new iPhone generation

If you've followed the iPhone hacking scene you probably heard about cables such as the Kanzi Cable, Kong Cable, Bonobo Cable, and so on: Special cables that allow access to hardware debugging features on Lightning-based iPhones such as UART and JTAG. However with the iPhone 15, all of those tools became basically useless: USB-C is here, and with that we need new hardware and software tooling.

This talk gives you a brief history of iPhone hardware hacking through the Lightning port, and then looks at the new iPhone 15, and how - using vendor defined messages, modifying existing tooling like the Central Scrutinizer, and a bit of hardware hacking - we managed to get access to the (unfortunately locked on production devices) JTAG interface exposed on the USB-C port on the new iPhone 15.

And how you can do it using open-source tooling too.

The iPhone's Lightning connector was a proprietary beast with a lot of hidden features: By sending custom SDQ commands there, it was possible to get it to expose hardware debugging features such as JTAG and UART. For a long time, this was only easily possible using either gray and black-market cables such as the Kanzi-Cable, or proprietary tools such as the Bonobo Cable. Last year, we released an open-source tool to get access to the iPhone debugging features called the Tamarin Cable - finally allowing anyone to get JTAG and UART on the iPhone for just a couple of $ in parts.

But then the iPhone 15 came along, and with that USB-C: All previous hardware and software tooling basically became useless, but that did not stop us from trying: We knew from the Apple Silicon macs and the work of t8012-team and the AsahiLinux project that Apple uses USB-C's VDM feature - Vendor Defined Messages - to allow access to features such as the UART console, and so chances were high that we could use something similar to get access to the hardware debugging features on the iPhone 15.

So we pre-ordered the iPhone 15, a couple of PCBs, a case of Club Mate and got started: And less than 48 hours after the launch we got JTAG working on the iPhone 15.

In this talk we will start by looking at the history of iPhone and Lightning hardware hacking, and then look at how USB-C is used for debugging on Apple Silicon devices, and what we had to do to get JTAG on the iPhone 15.

We will also use this talk to release the new version of the open-source Tamarin Cable firmware: Tamarin-C. A fully integrated, open-source debugging probe for the iPhone 15 and other Apple Silicon devices. Tamarin-C is also able to give access to a DFU mode that you can't access without sending VDMs.


Note: This talk will not contain any 0days or previously unknown vulnerabilities. Production iPhones are locked, and so while we get access to some of the device's busses we can't for example access the CPU core.


This talk is about building tooling for future work.

stacksmashing

https://events.ccc.de/congress/2023/h...

#37c3 #Security

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
37C3 -  Apple's iPhone 15: Under the C

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

37C3 -  Adventures in Reverse Engineering Broadcom NIC Firmware

37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware

38C3 - ACE up the sleeve: Hacking into Apple's new USB-C Controller

38C3 - ACE up the sleeve: Hacking into Apple's new USB-C Controller

SCADA Trainer Kit | Introduction and System Overview | Industrial Automation Lab

SCADA Trainer Kit | Introduction and System Overview | Industrial Automation Lab

37C3 -  Finding Vulnerabilities in Internet-Connected Devices

37C3 - Finding Vulnerabilities in Internet-Connected Devices

Получение JTAG на iPhone 15

Получение JTAG на iPhone 15

[Eng] EP18 - FortiGate Auth Bypass and Credential Stealer (CVE-2019-6693/CVE-2022-40684)

[Eng] EP18 - FortiGate Auth Bypass and Credential Stealer (CVE-2019-6693/CVE-2022-40684)

37C3 -  Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

37C3 - Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

Intro to Hardware Reversing: Finding a UART and getting a shell

Intro to Hardware Reversing: Finding a UART and getting a shell

38C3 - Find My * 101

38C3 - Find My * 101

The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)

The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)

37C3 -  Sucking dust and cutting grass: reversing robots and bypassing security

37C3 - Sucking dust and cutting grass: reversing robots and bypassing security

Зачем убивают нал? Под колпаком у государства  /// Рафаэль Абдулов. Fundamentum #47

Зачем убивают нал? Под колпаком у государства /// Рафаэль Абдулов. Fundamentum #47

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

ВЫКЛЮЧИ ЭТО НА ГОСУСЛУГАХ: отказывают в отмене штрафов

ВЫКЛЮЧИ ЭТО НА ГОСУСЛУГАХ: отказывают в отмене штрафов

37C3 -  Operation Triangulation: What You Get When Attack iPhones of Researchers

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

Иран за 4 дня?

Иран за 4 дня?

38C3 - Breaking the Mirror – A Look at Apple’s New iPhone Remote Control Feature

38C3 - Breaking the Mirror – A Look at Apple’s New iPhone Remote Control Feature

Я полностью перешел на Linux и больше НИКОГДА не установлю Windows

Я полностью перешел на Linux и больше НИКОГДА не установлю Windows

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]