YoVDO

SyScan360'16 Singapore - Memory Corruption Is For Wussies

Offered By: SyScan360 via YouTube

Tags

SyScan360 Courses Cybersecurity Courses Memory Corruption Courses

Course Description

Overview

Dive into advanced OS X exploitation techniques in this comprehensive conference talk from SyScan360'16 Singapore. Explore System Integrity Protection, OS X architecture, and Mach messaging. Learn about execve and related functions, supersonic OS X exploitation methods, and the process of loading unsigned kernel extensions. Gain insights into memory corruption vulnerabilities and their implications for system security. Conclude with key takeaways and a tribute to Dave, emphasizing the importance of staying vigilant in the ever-evolving landscape of cybersecurity.

Syllabus

Intro
System Integrity Protection
Dumb developers...
OS X Architecture
Introduction to Mach
Mach messaging
Execve and friends
Supersonic os x exploitation
Loading unsigned kexts
Conclusions
NEVER FORGET DAVE!
Greetings


Taught by

SyScan360

Related Courses

Remote Code Execution via Java Native Deserialization
SyScan360 via YouTube
Virtualization System Vulnerability Discovery Technology
SyScan360 via YouTube
OSX El Capitan - Sinking The Ship
SyScan360 via YouTube
SyScan360'16 Singapore - Key Value Injections Here
SyScan360 via YouTube
How to Own Any Windows Network via Group Policy Hijacking Attacks
SyScan360 via YouTube