SyScan360'16 Singapore - Memory Corruption Is For Wussies
Offered By: SyScan360 via YouTube
Course Description
Overview
Dive into advanced OS X exploitation techniques in this comprehensive conference talk from SyScan360'16 Singapore. Explore System Integrity Protection, OS X architecture, and Mach messaging. Learn about execve and related functions, supersonic OS X exploitation methods, and the process of loading unsigned kernel extensions. Gain insights into memory corruption vulnerabilities and their implications for system security. Conclude with key takeaways and a tribute to Dave, emphasizing the importance of staying vigilant in the ever-evolving landscape of cybersecurity.
Syllabus
Intro
System Integrity Protection
Dumb developers...
OS X Architecture
Introduction to Mach
Mach messaging
Execve and friends
Supersonic os x exploitation
Loading unsigned kexts
Conclusions
NEVER FORGET DAVE!
Greetings
Taught by
SyScan360
Related Courses
Remote Code Execution via Java Native DeserializationSyScan360 via YouTube Virtualization System Vulnerability Discovery Technology
SyScan360 via YouTube OSX El Capitan - Sinking The Ship
SyScan360 via YouTube SyScan360'16 Singapore - Key Value Injections Here
SyScan360 via YouTube How to Own Any Windows Network via Group Policy Hijacking Attacks
SyScan360 via YouTube