Главная
Study mode:
on
1
Introduction
2
Cedrics Background
3
Outline
4
State of the Union
5
Command Line Processes
6
MacShell
7
BlueTeam Analysis
8
Pros and Cons
9
Developer Notes
10
Invoke API Calls
11
Challenge Yourself
12
Getting Started
13
Xcode
14
ToolMax
15
Socket
16
Fake authentication prompts
17
Cocoa API
18
NS Apple Script
19
AmIMyMac
20
File Manager
21
Command Line
22
Using Xcode
23
Sandboxing
24
Sandbox Example
25
Adding Code Behind Elements
26
Adding Code Behind App Window
27
App Fill
28
Running Short on Time
29
Python Code
30
GitHub
Description:
Explore techniques for bypassing MacOS detections using Swift in this 25-minute conference talk from Derbycon 2019. Delve into Cedric Owens' expertise as he covers command line processes, MacShell, blue team analysis, and developer notes. Learn about invoking API calls, creating fake authentication prompts, and utilizing Cocoa API and Apple Script. Discover how to use Xcode, implement sandboxing, and add code behind elements and app windows. Gain insights into Python code integration and access resources on GitHub to enhance your understanding of MacOS security bypasses.

Stable 00 Bypassing MacOS Detections With Swift

Add to list
0:00 / 0:00