A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
2021-12-15 20:16:12 Author: www.reddit.com(查看原文) 阅读量:4 收藏

Was waiting to see what they did with that buffer overwrite trick. Expected a standard code is in image data which is copied to a buffer. But then, whammo! No, they used the image decoder to assemble themselves a toy computer!

What's next? Someone embeds an FPGA inside a music stream?

Be interesting to see how they jump the program counter to start execution. This is seriously evil stuff.


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/rh88wt/a_deep_dive_into_an_nso_zeroclick_imessage/
如有侵权请联系:admin#unsafe.sh