YoVDO

Exploring Yosemite - Abusing Mac OS X 10.10

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Malware Courses Security Vulnerabilities Courses Rootkits Courses

Course Description

Overview

Delve into a comprehensive exploration of Mac OS X 10.10 Yosemite's security landscape in this 57-minute Black Hat conference talk by Sung-ting Tsai and Ming-chieh Pan. Begin with a review of Yosemite's new features and security improvements, analyzing their impact from both defensive and offensive perspectives. Discover the problems solved, new issues introduced, and existing vulnerabilities that remain exploitable. Progress to an in-depth examination of various methods to abuse Mac OS X 10.10, including demonstrations of malware and rootkit execution. Learn about cutting-edge offensive techniques in both kernel and user modes, such as loading unsigned kernel modules without triggering warnings, manipulating kernel objects to evade detection, and implementing stealthy malware launch methods. Gain insight into a newly released security tool, SVV-X (System Virginity Verifier for Mac OS X), designed to comprehensively scan for rootkits and system abnormalities. Explore its capabilities, including checks for syscall table hooks, mach trap modifications, IDT table alterations, critical data verification, kernel code integrity, and various user mode exploits.

Syllabus

Exploring Yosemite: Abusing Mac OS X 10.10


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube