Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden AppYeongjin
Jang from the Georgia Institute of Technology sheds light on the inalienable
constituents of the Mactans attack from a more profound technical perspective. Starting
with an overview of the provisioning profile features, the researcher also
covers the methodology for obtaining the provisioning profile on the to-be compromised
iOS device. Next goes the analysis of how an arbitrary hidden app can be
installed, what should be done to obfuscate its execution, and how a private
API can be exploited.
Source:
Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App