YoVDO

Hacking Exposed - Hacking Macs

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses macOS Courses Forensics Courses Intrusion Detection Courses

Course Description

Overview

Explore real-world case studies of advanced intrusions on MacOS systems in this 51-minute RSA Conference talk. Delve into detailed breakdowns of tactics, techniques, and procedures (TTPs) and artifacts used by attackers. Witness live demonstrations of these attacks and learn relevant countermeasures for detection and response. Gain insights into different attacker TTPs on MacOS systems, understand how macOS process visualization trees can be used for forensics, and learn about the relevance of both static and behavioral indicators in intrusions. The session covers topics such as delivery URL schemes, privilege escalation, credential theft, persistence, and exfiltration, along with their respective countermeasures. Don't miss the must-see Adversary Oscars segment. Basic understanding of hacking tools and techniques is recommended.

Syllabus

Intro
CROWDSTRIKE INTELLIGENCE NAMING CONVENTIONS
BREAKOUT TIME BY ADVERSARY
DELIVERY URL SCHEMES
DELIVERY COUNTERMEASURES
PRIVILEGE ESCALATION POOR UPDATE PRACTICE
PRIVILEGE ESCALATION COUNTERMEASURES
CREDENTIAL THEFT HASHDUMP
CREDENTIAL THEFT COUNTERMEASURES
PERSISTENCE COUNTERMEASURES
EXFIL COUNTERMEASURES


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube