YoVDO

Attacking Primary Refresh Tokens Using MacOS Implementation - TROOPERS24

Offered By: WEareTROOPERS via YouTube

Tags

Security Vulnerabilities Courses Cybersecurity Courses Penetration Testing Courses macOS Courses OAuth 2.0 Courses Token-Based Authentication Courses Identity and Access Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an in-depth analysis of attacking Primary Refresh Tokens through their MacOS implementation in this 55-minute conference talk by Olaf Hartong and Dirk-jan Mollema. Scheduled for June 27th, 2024, at the TROOPERS24 IT security conference in Heidelberg, Germany, the presentation delves into advanced cybersecurity techniques. Gain valuable insights into potential vulnerabilities and attack vectors specific to MacOS systems. Learn about the intricacies of Primary Refresh Tokens and how they can be exploited. Hosted by @ERNW_ITSec, this talk is part of the broader TROOPERS24 event, which focuses on cutting-edge IT security topics. For more information and updates, follow the conference on social media platforms and visit the official website at https://troopers.de/troopers24/talks/3vlccy/.

Syllabus

TROOPERS24: Attacking Primary Refresh Tokens using their MacOS implementation


Taught by

WEareTROOPERS

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera