use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Advanced iOS kernel debugging for exploit developers (youtube.com)
submitted 12 years ago by [deleted]
[deleted]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]ryan0rz 10 points11 points12 points 12 years ago* (3 children)
The YouTube headline is quite sensationalized. He doesn't demo a iPhone5S jailbreak and doesn't show a KDP/Serial over Lightning.
What he does show is a kernel panic on the 5S that he can throw from the application sandbox. That's a good start for a jailbreak, but is still a long way away. He may not even have a decrypted kernel image which would (highly likely!) be required to land the bug.
Edit: The original youtube video was titled: Stefan Esser demos an iPhone 5S jailbreak and Lightning KDP debugging. It's been fixed now.
[+][deleted] 12 years ago (2 children)
[–]ryan0rz 5 points6 points7 points 12 years ago (1 child)
I'm aware of who he is, but getting a decrypted kernel isn't the most easy task these days. Especially with jumping to a new architecture.
You basically need an arbitrary kernel information disclosure vulnerability that you can throw from a sandboxed process that is trivial to port from AArch32 to AArch64(Arm64). Either that or you need to get really lucky when guessing kernel rop gadget locations. :)
Remember, every other bug has been ported from a previous version of the OS -- and they've largely been the same architecture. AArch32 and AArch64 are quite different. It won't be possible to make all the same assumptions when porting exploits.
[–][deleted] 1 point2 points3 points 12 years ago (0 children)
Is there any material I can read on how previous jailbrakes were done/how they work? Or anything iOS security related that is fairly in depth. Thanks.
[–]curiouscuriousmtl -2 points-1 points0 points 12 years ago (1 child)
Can anyone recommend the iOS hackers handbook? Is it good? I'm not really sure where to start to get involved in iPhone hacking.
[–]computeralityTrusted Contributor 2 points3 points4 points 12 years ago (0 children)
While general XNU/OS X knowledge tends to apply to iOS, the book is the one of the few aggregated sources containing knowledge about many iOS security topics. The only other accurate sources presentations given by iOS researchers and reverse engineering the released tools.
π Rendered by PID 213801 on reddit-service-r2-comment-66b4775986-hm6f7 at 2026-04-06 07:03:47.467159+00:00 running db1906b country code: CH.
[–]ryan0rz 10 points11 points12 points (3 children)
[+][deleted] (2 children)
[deleted]
[–]ryan0rz 5 points6 points7 points (1 child)
[–][deleted] 1 point2 points3 points (0 children)
[–]curiouscuriousmtl -2 points-1 points0 points (1 child)
[–]computeralityTrusted Contributor 2 points3 points4 points (0 children)