2024-09-28 –, Main Track
The world of iOS exploitation is daunting and intimidating to even seasoned security researchers. High barriers of entry, the mysterious world of exploit brokerage and a list of exploit mitigations that seem to perpetually go on and on... One core component of iOS exploitation is the construction of JOP/ROP chains and stack pivoting. If you don’t know what that is, this is the talk for you. Even the most untechnical security researcher will walk away knowing exactly how to find stack pivots used in real world iOS exploits.
Founder of XINTRA, Lina is a security researcher, Black Hat trainer, SANS advisory board member and has presented at several international conferences and authored a book on cybersecurity. She currently holds the following certifications: GXPN, GASF, GREM, GCFA and OSCP.