14.12.2016., 12:00
|
#254
|
|
E Pluribus UNIX
Datum registracije: Oct 2002
Lokacija: M82
Postovi: 6,800
|
TLDRabusing the local upgrade process to bypass SIP
https://objective-see.com/blog/blog_0x14.html
tldr;
Citiraj:
|
In short, since the OS upgrader is allowed to bless images that aren't validated, we can coerce the system to boot off a malicious image. Once this occurs, OS-level protections, such as SIP are moot.
|
|
|
|