Attacking Primary Refresh Tokens Using MacOS Implementation - TROOPERS24
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an in-depth analysis of attacking Primary Refresh Tokens through their MacOS implementation in this 55-minute conference talk by Olaf Hartong and Dirk-jan Mollema. Scheduled for June 27th, 2024, at the TROOPERS24 IT security conference in Heidelberg, Germany, the presentation delves into advanced cybersecurity techniques. Gain valuable insights into potential vulnerabilities and attack vectors specific to MacOS systems. Learn about the intricacies of Primary Refresh Tokens and how they can be exploited. Hosted by @ERNW_ITSec, this talk is part of the broader TROOPERS24 event, which focuses on cutting-edge IT security topics. For more information and updates, follow the conference on social media platforms and visit the official website at https://troopers.de/troopers24/talks/3vlccy/.
Syllabus
TROOPERS24: Attacking Primary Refresh Tokens using their MacOS implementation
Taught by
WEareTROOPERS
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera