Fuzzing at Mach Speed: Uncovering IPC Vulnerabilities on MacOS
Offered By: nullcon via YouTube
Course Description
Overview
Dive into an in-depth exploration of macOS Inter-Process Communication (IPC) security in this 53-minute conference talk from Nullcon Berlin 2024. Uncover the intricacies of Mach message handlers and their role in executing privileged RPC-like functions, potentially leading to sandbox escapes and privilege escalations. Examine macOS internals, focusing on Mach message calling, processing, data formats, and statefulness. Learn about the development and application of a custom fuzzing harness targeting IPC function handlers, designed to induce crashes indicative of memory corruption vulnerabilities. Analyze several generated crashes, including one with potential for remote code execution. Gain insights into the open-sourced Mach message corpus generation script and custom fuzzing harness, contributing to the cybersecurity community and paving the way for future research in this area.
Syllabus
Nullcon Berlin 2024 | Fuzzing At Mach Speed: Uncovering IPC Vulnerabilities On MacOS - Dillon Franke
Taught by
nullcon
Related Courses
Assembly Language Adventures (1): Counting with two digitsUdemy Assembly Language Adventures: Complete Course
Udemy OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)
Cybrary Analyzing Wi-Fi Wardriving Data with Google Colab
SecurityFWD via YouTube Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube