Drill Apple Core - Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit
Offered By: Black Hat via YouTube
Course Description
Overview
Explore kernel sanitizer development for code coverage and memory issue detection in this 49-minute Black Hat conference talk. Learn about creating detailed patterns for XNU syscall API, and witness a live demonstration of exploiting three zero-day vulnerabilities in macOS 10.13.6 to gain root access. Discover a powerful technique for obtaining code coverage without source code using static analysis. Presented by Dongyang Wu, Yuefeng Li, and Juwei Lin, this talk offers insights into fuzzing Apple core components in both kernel and user mode for security research and exploitation.
Syllabus
Drill Apple Core: Up and Down - Fuzz Apple Core Component in Kernel and User Mode for Fun and Profit
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube