Keen Security lab is established in 2016 and transformed from famous Keen Team. The team attends on advanced security research such as PC / mobile operating systems, applications, cloud computing, IOT smart devices etc. As well Keen Security Lab widely focuses on Tencent products and technologies.
The Keen team successfully exploited vulnerabilities in above iOS versions. Security researches of the Keen team focused research on iOS vulnerability, mechanism and exploitation mitigations for a long time. As a result of that, overcome the iOS 12.2 Jailbreak on A12 devices recently. Further, Keen Lab accomplished iOS 12.1 Jailbreak, iOS 12 Jailbreak, iOS 11.3.1 Jailbreak, iOS 11.1.1 Jailbreak, iOS 11 Jailbreak & iOS 10.3.2 jailbreak using various devices at various worldwide hacking conferences.Car Hacking Research - Hack Tesla Model S with Remote Attack
Tesla Motors is considered to be one of the most comprehensive cyber-security automakers in the world. Last couple of months Keen team inspections about the Tesla car and identified various security vulnerabilities and successfully implemented both physical connections or the Parking and Driving Mode of the Tesla Model S. Proud to say that we used an unmodified car with the latest firmware to demonstrate the attack.Complete OSX Privilege Escalation
Keen Lab use the Blitzard kernel error to avoid the Safari renderer sandbox, existing in the blit operation of graphics pipeline for pwn2own. We used own Exploitation method with The IGVector add function, add Drivers function and mainly with kalloc.48 and kalloc.4096.
Keen Lab focused on kernel exploit mitigations appeared on Android for the recent 2 years. Discovered implementation of mitigations/ bypassing techniques/Android WEXT attack surface analysis & details of three rooting exploits once affected most Android devices.
Consisting history of windowserver, basic concepts, architecture, CVE-2014-1314 design flaw and details of the pwnie nomination bug: CVE-2016-1804, which we used to inscribe the latest OS X El Capitan remotely with a browser exploit and improve to root access. Resolves several issues discovered by Part 1 still existing in Window Server. Finally Exploited CVE-2016-1804 with full remote root by chaining with Safari exploit. Exploited both userland graphics and kernel graphics.