-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sandbox Profiles #2
Comments
As I noticed, if the exploit rebinds files, then why not try to rebind functions (replace functions, call them, and so on) |
I don't think you can overwrite code since code signing would prevent the modified executable from launching. |
Unfortunately, the above method does not work. We need to look for other ways to use this exploit 🫤 |
I'm opening this topic again, details have appeared. iOS 14: /System/Library/Sandbox/Profiles However, right now I don't have one hundred percent conclusions about whether it will be useful. I will be glad if someone tells me about the purpose of this file. After reviewing it, I thought that he was responsible for the rights in the Sandbox, but in fact it may be otherwise. A lot of questions in this case, why in AuthKit? Another "novelty" of iOS 16 is that almost every framework has its own sandboxed profile, which prohibits or allows access to it via look-up. I will attach images below. The first image is the expected file of the general sandbox, the second image is a sample profile of the sandbox framework. Now we need a tests. |
Hi, I studied the features of the exploit. Here an idea arose, since we can replace files, is it possible to change the Sandbox profiles? Allow or grant read-write rights. I'm talking about profiles located in /System/Library/Sandbox/Profiles
The text was updated successfully, but these errors were encountered: