Source code and explanation of a multi-stage hack (not cyber-physical)

This multi-stage hack starts with the Mac-user victim visiting a malicious website and ends with malicious code executing in the kernel.  Used successfully at pwn2own 2018.

https://github.com/saelo/pwn2own2018


Contest results, including for the above exploit:
https://www.thezdi.com/blog/2018/3/14/pwn2own-2018-results-from-day-one

Comments