Ever since Pointer Authentication Code (PAC) has been introduced, iPhone remained standing for more than two years on various pwn contests until TianfuCup 2020 (Project Zero has reported a remote zero click exploit in 2019). Ant Security and Qihoo 360 used two different bug chains respectively to successfully gained remote code execution with userspace sandbox escape on iPhone 11 with iOS 14.2.
Days ago a twitter post revealed a bug in iOS Wi-Fi service:
This post is the last part of this silly series, but I think it’s the only noteworthy one. The exploit chain triggers two XSS across two privileged WebViews and bypasses GateKeeper to execute arbitrary native code outside the sandbox. It works on both High Sierra and Mojave.
Disclosing security vulnerabilities. For educational purpurse only
Unofficial frida extension for VSCode. Makes it easier to attach the targets
Enable WebInspect globally, allowing frontend debugging for third party apps on jailbroken devices