YoVDO

SyScan360'16 Singapore - Memory Corruption Is For Wussies

Offered By: SyScan360 via YouTube

Tags

SyScan360 Courses Cybersecurity Courses Memory Corruption Courses

Course Description

Overview

Dive into advanced OS X exploitation techniques in this comprehensive conference talk from SyScan360'16 Singapore. Explore System Integrity Protection, OS X architecture, and Mach messaging. Learn about execve and related functions, supersonic OS X exploitation methods, and the process of loading unsigned kernel extensions. Gain insights into memory corruption vulnerabilities and their implications for system security. Conclude with key takeaways and a tribute to Dave, emphasizing the importance of staying vigilant in the ever-evolving landscape of cybersecurity.

Syllabus

Intro
System Integrity Protection
Dumb developers...
OS X Architecture
Introduction to Mach
Mach messaging
Execve and friends
Supersonic os x exploitation
Loading unsigned kexts
Conclusions
NEVER FORGET DAVE!
Greetings


Taught by

SyScan360

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network