James is a black hat hacker employed as an authorized officer at Apple. He has credentials and signed a non-disclosure agreement to perform advanced penetration testing on the iOS 6.1.6 operating system, and has already gained low-level access to the mobile device using a backdoor. Which of the following actions should James take to design/create his own custom firmware to exploit underlying vulnerabilities and gain a higher level of access to a UNIX shell with root privileges, essentially allowing them to do anything on the device?


a. Copy the source code of the open-source BlackArch tool and build custom software from it

b. Clone and inherit the source code of the open-source software "P0sixspwn"

c. Copy the source code of open-source Mimikatz and build custom software from it

d. Clone and inherit the source code of the open-source software "Pwnage"

Q&A Education