Title: Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App Post by: HCK on October 18, 2023, 04:05:19 pm Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App
Yeongjin Jang from the Georgia Institute of Technology sheds light on the inalienable constituents of the Mactans attack from a more profound technical perspective. Starting with an overview of the provisioning profile features, the researcher also covers the methodology for obtaining the provisioning profile on the to-be compromised iOS device. Next goes the analysis of how an arbitrary hidden app can be installed, what should be done to obfuscate its execution, and how a private API can be exploited. Source: Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App (https://macsecurity.net/view/53-injecting-malware-into-ios-devices-via-malicious-chargers-3-installing-an-arbitrary-hidden-app) |