The new presentation (contents are in Spanish) I delivered at the end of 2014 about the still vulnerable iOS update process (even if there is an associated CVE-2014-4383) are available in the DinoSec Lab, iOS: Back to the Future II. More details available in the related DinoSec Blog post.
The two presentations (both contents are in English) I delivered in 2014 at Rooted CON and Area41 about security vulnerabilities in the iOS update process are available in the DinoSec Lab, Rooted CON and Area41 respectively, together with (current or future) links to the videos. More details available in the related DinoSec Blog post.
iCamasu, iOS com_apple_MobileAsset_SoftwareUpdate, is a Python-based tool that parses and extracts multiple details from Apple iOS software update PLIST files, com_apple_MobileAsset_SoftwareUpdate.xml, and it has been released at Area41. iCamasu is available in the DinoSec Lab and more details have been published in the DinoSec Blog.
June 4, 2014.
The multiple presentations (some given in Spanish but with English material) from the mobile devices Wi-Fi vulnerabilities in 802.1x/EAP Enterprise networks awareness campaign, performed one year after the original Rooted CON 2013 presentation, are available in the DinoSec Lab.
March and April, 2014.