Главная
Study mode:
on
1
Intro
2
CROWDSTRIKE INTELLIGENCE NAMING CONVENTIONS
3
BREAKOUT TIME BY ADVERSARY
4
DELIVERY URL SCHEMES
5
DELIVERY COUNTERMEASURES
6
PRIVILEGE ESCALATION POOR UPDATE PRACTICE
7
PRIVILEGE ESCALATION COUNTERMEASURES
8
CREDENTIAL THEFT HASHDUMP
9
CREDENTIAL THEFT COUNTERMEASURES
10
PERSISTENCE COUNTERMEASURES
11
EXFIL COUNTERMEASURES
Description:
Explore real-world case studies of advanced intrusions on MacOS systems in this 51-minute RSA Conference talk. Delve into detailed breakdowns of tactics, techniques, and procedures (TTPs) and artifacts used by attackers. Witness live demonstrations of these attacks and learn relevant countermeasures for detection and response. Gain insights into different attacker TTPs on MacOS systems, understand how macOS process visualization trees can be used for forensics, and learn about the relevance of both static and behavioral indicators in intrusions. The session covers topics such as delivery URL schemes, privilege escalation, credential theft, persistence, and exfiltration, along with their respective countermeasures. Don't miss the must-see Adversary Oscars segment. Basic understanding of hacking tools and techniques is recommended.

Hacking Exposed - Hacking Macs

RSA Conference
Add to list
0:00 / 0:00