[NEWS]Explication sur le jailbreak evasi0n   

Les news postées sur iPhone Info

[NEWS]Explication sur le jailbreak evasi0n

Messagepar Attila » Mar 5 Fév 2013 22:11

imageMaintenant que vous avez installé evasi0n, vous pouvez vous demander comment il marche. Planetbeing nous fournit une explication détaillée sur son fonctionnement...

A chaque fois qu'un jailbreak est trouvé, Apple corrige très rapidement les failles utilisées dans la prochaine version d'iOS. Ainsi, il faut pour chaque nouvel iOS trouver de nouvelles failles permettant le jailbreak untethered.

Evasi0n a été installé 800 000 fois en 6 heures selon Jay Freeman (saurik), le créateur de Cydia. Aujourd'hui, c'est plus de 1.7 Millions de fois que son installation a été faite.

Etant donné qu'il devient de plus en plus compliqué de trouver de nouvelles failles dans l'iOS, le fonctionnement devient de plus en plus complexe et nécessite beaucoup d'étapes.
Planetbeing (de son vrai nom David Wang) affirme utiliser ainsi 5 failles pour pouvoir jailbreaker totalement l'iPhone/iPad/iPod.

Il s'agit basiquement d'une faille utilisant un paramètre de fuseau horaire auquel on ne devrait pas avoir accès, d'un lien symbolique de ce fichier vers un socket du "Launch Daemon". Quand on clique sur l'icone Jailbreak, un exploit du type "shebang" appelle un autre bout de code pour ainsi contourner la signature de code et d'autres étapes, dont je vous laisse le plaisir de la lecture en anglais :
Evasi0n begins by running libimobiledevice, a program that substitutes for iTunes to communicate with iOS devices via the same protocol as Apple’s program. Using that tool, Evasi0n exploits a bug in iOS’s mobile backup system to gain access to certain settings that it normally shouldn’t be able to access, namely a file that indicates the device’s time zone.
The jailbreak program inserts a “symbolic link” in that time zone file, a shortcut from one place in an operating system to another. In this case the link leads to a certain “socket,” a restricted communications channel between different programs that Wang describes as a kind of “red telephone to Moscow.” Evasi0n alters the socket that allows programs to communicate with a program called Launch Daemon, abbreviated launchd, a master process that loads first whenever an iOS device boots up and can launch applications that require “root” privileges, a step beyond the control of the OS than users are granted by default. That means that whenever an iPhone or iPad’s mobile backup runs, it automatically grants all programs access to the time zone file and, thanks to the symbolic link trick, access to launchd.
iOS has another safeguard that would normally prevent any rogue application from gaining access to launchd: Code-signing. That restriction requires that all code run on a device is approved with an unforgeable signature from Apple. So Evasi0n launches a new app that appears to have no code at all–signed or unsigned. But when a user is prompted and taps the app’s icon, it uses a Unix trick called a “shebang” that can summon up code from another, signed application. In this case, it summons up launchd–which it can only access thanks to the socket change it made earlier–and uses it to run a “remount” command that changes the memory settings of the read-only root file system to make it writable.
Now that the root file system is writable, evasi0n changes a file called launchd.conf that alters the configuration of launchd so that the changes evasi0n makes to it are repeated every time it runs. That’s what will make the jailbreak “persistent”: The user won’t need to re-run the program over a USB cable every time the device boots.
Even after all those contortions, a device isn’t jailbroken until its restrictions are removed at the “kernel” layer–the deepest part of the operating system that performs the code-signing checks to prevent running unapproved apps using a process called the Apple Mobile File Integrity Daemon. (AMFID) So evasi0n uses launchd to load a library of functions into AMFID every time a program launches that somehow swaps out the function that checks for a code signature for one that always returns an “approved” answer. Wang won’t say exactly how that AMFID-defeating part of the jailbreak works. “Apple can figure that one out for themselves,” he says.
iOS has yet another safeguard to prevent hackers from altering memory in the operating system kernel: Address Space Layout Randomization, or ASLR. That defensive trick moves the location of device’s code in its flash memory a certain, random distance every time it boots up to stymie anyone who would write over a particular part of the code. But evasi0n uses a memory allocation trick to locate one spot in memory that’s harder to hide in ARM-chip-based devices, known as the ARM exception vector. That part of the kernel handles application crashes, reporting on where in memory they happened. So evasi0n simulates a crash and checks the ARM exception vector to see where the crash occurred, providing just enough information to map out the rest of the kernel in the device’s memory.
Once it’s beaten ASLR, the jailbreak uses one final bug in iOS’s USB interface that passes an address in the kernel’s memory to a program and “naively expects the user to pass it back unmolested,” according to Wang. That allows evasi0n to write to any part of the kernel it wants. The first place it writes is to the part of the kernel that restricts changes to its code–the hacker equivalent of wishing for more wishes. ”Once you get into the kernel, no security matters any more,” says Wang. “Then we win.”


http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/Source : http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/
Avatar de l’utilisateur
Attila
Administrateur du site
 
Messages: 2919
Inscription: Lun 28 Déc 2009 18:41

Re: [NEWS]Explication sur le jailbreak evasi0n

Messagepar Attila » Jeu 7 Fév 2013 02:53

une explication encore plus technique :
http://blog.accuvantlabs.com/blog/bthom ... -component
Avatar de l’utilisateur
Attila
Administrateur du site
 
Messages: 2919
Inscription: Lun 28 Déc 2009 18:41


Retourner vers News

 


  • Articles en relation
    Réponses
    Vues
    Dernier message

Qui est en ligne

Utilisateurs parcourant ce forum: Google [Bot] et 19 invités