Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.tech·14h·
Flag this post

Context

It’s been a while since I started poking around Mickey Jin’s research post about Sandbox escapes. It was the first type of vulnerability I experimented with. I’d like to share the mistakes I made and how I overcame them.

In this post, I’ll show you how to:

  • Filter existing XPC helpers
  • Check whether a service accepts connections
  • Script an XPC client in Objective-C

In short, this post contains what I wished I had found in Mickey Jin’s original article when I started.

XPC helpers of type application

This post focuses on connecting to XPC helpers of type Application. These helpers accept requests from other processes, which makes them interesting to attack. For a deeper explanation, see Mickey Jin’s …

Similar Posts

Loading similar posts...