Attacking Primary Refresh Tokens Using MacOS Implementation - TROOPERS24
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore an in-depth analysis of attacking Primary Refresh Tokens through their MacOS implementation in this 55-minute conference talk by Olaf Hartong and Dirk-jan Mollema. Scheduled for June 27th, 2024, at the TROOPERS24 IT security conference in Heidelberg, Germany, the presentation delves into advanced cybersecurity techniques. Gain valuable insights into potential vulnerabilities and attack vectors specific to MacOS systems. Learn about the intricacies of Primary Refresh Tokens and how they can be exploited. Hosted by @ERNW_ITSec, this talk is part of the broader TROOPERS24 event, which focuses on cutting-edge IT security topics. For more information and updates, follow the conference on social media platforms and visit the official website at https://troopers.de/troopers24/talks/3vlccy/.
Syllabus
TROOPERS24: Attacking Primary Refresh Tokens using their MacOS implementation
Taught by
WEareTROOPERS
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent