{
	"id": "4050441a-739e-4e18-91e5-525de7d79167",
	"created_at": "2026-04-06T00:09:12.72953Z",
	"updated_at": "2026-04-10T03:21:32.53035Z",
	"deleted_at": null,
	"sha1_hash": "281aa8990c2719010b82b40bb2acfcbd2622cc83",
	"title": "Pegasus internals",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 163992,
	"plain_text": "Pegasus internals\r\nArchived: 2026-04-05 23:43:16 UTC\r\n1. browse\r\n2. congress\r\n3. 2016\r\n4. event\r\nMax Bazaliy\r\nVideo Player\r\n00:00\r\n00:00 | 29:38\r\nNone\r\neng\r\nfin (translated)\r\n2.00x\r\n1.50x\r\n1.25x\r\n1.00x\r\n0.75x\r\nPlaylists: '33c3' videos starting here / audio / related events\r\nThis talk will take an in-depth look at the technical capabilities and vulnerabilities used by Pegasus. We will focus\r\non Pegasus’s features and the exploit chain Pegasus used called Trident. Attendees will learn about Pegasus’s use\r\nof 0-days, obfuscation, encryption, function hooking, and its ability to go unnoticed. We will present our detailed\r\ntechnical analysis that covers each payload stage of Pegasus including its exploit chain and the various 0-day\r\nvulnerabilities that the toolkit was using to jailbreak a device. After this talk attendees will have learned all of the\r\ntechnical details about Pegasus and Trident and how the vulnerabilities we found were patched.\r\nDownload\r\nThese files contain multiple languages.\r\nhttps://media.ccc.de/v/33c3-7901-pegasus_internals\r\nPage 1 of 2\n\nThis Talk was translated into multiple languages. The files available for download contain all languages as\r\nseparate audio-tracks. Most desktop video players allow you to choose between them.\r\nPlease look for \"audio tracks\" in your desktop video player.\r\nSubtitles\r\nAudio\r\nRelated\r\nTags\r\nSource: https://media.ccc.de/v/33c3-7901-pegasus_internals\r\nhttps://media.ccc.de/v/33c3-7901-pegasus_internals\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"references": [
		"https://media.ccc.de/v/33c3-7901-pegasus_internals"
	],
	"report_names": [
		"33c3-7901-pegasus_internals"
	],
	"threat_actors": [],
	"ts_created_at": 1775434152,
	"ts_updated_at": 1775791292,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/281aa8990c2719010b82b40bb2acfcbd2622cc83.pdf",
		"text": "https://archive.orkl.eu/281aa8990c2719010b82b40bb2acfcbd2622cc83.txt",
		"img": "https://archive.orkl.eu/281aa8990c2719010b82b40bb2acfcbd2622cc83.jpg"
	}
}