YoVDO

Exploring Yosemite - Abusing Mac OS X 10.10

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Malware Courses Security Vulnerabilities Courses Rootkits Courses

Course Description

Overview

Delve into a comprehensive exploration of Mac OS X 10.10 Yosemite's security landscape in this 57-minute Black Hat conference talk by Sung-ting Tsai and Ming-chieh Pan. Begin with a review of Yosemite's new features and security improvements, analyzing their impact from both defensive and offensive perspectives. Discover the problems solved, new issues introduced, and existing vulnerabilities that remain exploitable. Progress to an in-depth examination of various methods to abuse Mac OS X 10.10, including demonstrations of malware and rootkit execution. Learn about cutting-edge offensive techniques in both kernel and user modes, such as loading unsigned kernel modules without triggering warnings, manipulating kernel objects to evade detection, and implementing stealthy malware launch methods. Gain insight into a newly released security tool, SVV-X (System Virginity Verifier for Mac OS X), designed to comprehensively scan for rootkits and system abnormalities. Explore its capabilities, including checks for syscall table hooks, mach trap modifications, IDT table alterations, critical data verification, kernel code integrity, and various user mode exploits.

Syllabus

Exploring Yosemite: Abusing Mac OS X 10.10


Taught by

Black Hat

Related Courses

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
Udemy
CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent
OPSEC and Personal Security Guide - Cybertalk Episode 7
HackerSploit via YouTube
Demystifying Modern Windows Rootkits
Black Hat via YouTube
Investigating Malware Using Memory Forensics - A Practical Approach
Black Hat via YouTube