In December 2017,Google Project 0’s Ian Beer released an exploit for two iOS kernel bugs. This is Bryce’s story of going from being a iOS kernel n00b to weaponizing the exploit into a fully functioning jailbreak for iOS 11.1.2. Each challenge along the path will be discussed including: iOS sandboxing, the terrible AMFI, the intricacies of code signing & entitlements, sleep deprivation, and more. Everyone & all skill levels are welcome—kernel hacking isn’t that scary!
Bryce has been an active competitive hacker for the past 13 years, is a core team member of V&, and competes regularly with Nasa Rejects and Spaceticles—previously playing with Mammon Machine and Men-In-Black-Hats, obtaining a Black Badge at DefCon 19. Alongside V&, Bryce has run OpenCTF at DefCon for several years and is deeply embedded in the CTF community, encouraging newcomers to participate and learn as well as challenging seasoned CTF players with mind bending problems. Professionally, Bryce has been a vulnerability researcher for several years and is currently a security consultant and penetration tester at Coalfire Inc.