Главная
Study mode:
on
1
Intro
2
Disclaimer
3
Agenda
4
How did I get here
5
Post exploitation 101
6
Malware quality
7
Persistence
8
LaunchD
9
Keep Alive
10
Watch Path
11
SocketListener
12
Root
13
System Events
14
System Escape Button
15
Icon File
16
File Vault iCloud
17
Popup Dialog
18
Fake Background
19
Keychain Access
20
Keychain Watch
21
Password Manager
22
Keychain
23
Whats Inside
24
Stealing Applications
25
Saving Passwords
26
Users Keychain
27
Copy Keychain Values
28
Instruments
29
Files
30
Time
31
General Approach
32
Steps
33
SSH Bypass
34
Conclusion
Description:
Explore advanced Mac post-exploitation techniques in this NolaCon 2018 conference talk. Delve into topics such as malware quality, persistence methods, and system event manipulation. Learn about LaunchD, Keep Alive, Watch Path, and Socket Listener functionalities. Discover how to access and exploit the Keychain, including stealing applications, saving passwords, and copying Keychain values. Examine file system exploration, SSH bypass techniques, and general approaches to post-exploitation on Mac systems. Gain insights into elevated privileges, fuzzy operations, and nonce-based attacks for a comprehensive understanding of Mac security vulnerabilities and exploitation strategies.

Your Mac Defenestrated Post OSXploitation Elevated - FuzzyNop Noncetonic

Add to list
0:00 / 0:00