Synthetically Breaking macOS - Patrick Wardle - Ekoparty Security Conference - 2019
Offered By: Ekoparty Security Conference via YouTube
Course Description
Overview
Explore an in-depth analysis of macOS security vulnerabilities in this conference talk from Ekoparty 2019. Delve into Patrick Wardle's research on exploiting a subtle code-signing flaw in macOS that allows unprivileged attackers to programmatically interact with the UI. Learn how this capability can be used to bypass Mojave's security mechanisms with a single synthetic click. Discover the intricacies of Apple Scripts, synthetic events, and macOS internals. Examine the process of finding the database and understanding matched code requirements. Witness a live demonstration of synthetic events and their implications. Gain insights into Apple's bug bounty program and discuss methods for preventing synthetic clicking. Benefit from the expertise of Patrick Wardle, Chief Research Officer at Digita Security and founder of Objective-See, as he shares his extensive knowledge in macOS security.
Syllabus
Introduction
Apple Scripts Synthetic Events
Apples Response
macOS Internals
Finding the Database
Matched Code Requirements
Demo
Synthetic Events
Why not to pick on Apple
Apple Bug Bounty Program
Preventing Synthetic Clicking
Conclusion
Taught by
Ekoparty Security Conference
Related Courses
Cybersecurity Roles, Processes & Operating System SecurityIBM via Coursera Operating Systems and Security
IBM via edX The Complete Cyber Security Course : Hackers Exposed!
Udemy IT Security Foundations: Operating System Security
LinkedIn Learning The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube