Apple is understood for numerous issues, however opening up their platforms to the arena isn’t one of the ones issues. According to a up to date Google publish by means of [Brandon Azad], there do existwhich might be made for construction with JTAG ports and different magic features. The port is (despite the fact that unpopulated), however is locked down by means of default. We don’t know what it takes to get a magic iPhone, however we’re guessing Google can’t ship within the field tops to three Macbook Pros to get at the ready record. But what’s locked may also be unlocked, and [Brandon] got down to construct a debuggable iPhone.
Exploiting some debug registers, it’s imaginable to debug the A11 CPU at any level in its execution. [Brandon’s] software unmarried steps the machine reset and makes some changes to the CPU after key directions to forestall the lockdown of kernel reminiscence. After that, the arena’s your oyster.is a device constructed the usage of this system that may debug an iPhone with an ordinary cable.
The title is a play on KTRR which is the Kernel Text Readonly Region. The paintings follows the instance of a few previous exploits that did an identical issues. Those strategies, despite the fact that, didn’t have the versatility that KTRW gives.
Honestly, we don’t in reality care about debugging the iPhone however the cat and mouse tale of methods to paintings round the entire Apple coverage is a lovely excellent learn. Of direction, it in reality is cat and mouse. KTRW doesn’t paintings on A12 units. Curiously, [Brandon] thinks folks already knew this or an identical how to compromise the telephone, however didn’t put up it to deter Apple remaining the door that allows them to in.
Apple telephones have a name as being protected, however they. And if you wish to simply disable a few of them, you simplest want .