Главная
Study mode:
on
1
Introduction
2
Overview
3
Background
4
Bounty Approach
5
Logic
6
Setting up our own download server
7
Cutting off the malicious package
8
Freedom Freedom
9
Putting It All Together
10
Key Takeaways
11
Bug Fixes
12
Collaboration is Key
13
Tools
14
Questions
15
Why Zoom is not present in Windows
16
What if we download Zoom
17
Prerequisites
18
Backdoor Zoom
19
QA
Description:
Explore the process of reverse engineering and exploiting the macOS Zoom client in this HITB Security Conference talk. Delve into the journey of discovering a critical zero-interaction remote code execution vulnerability during a bug bounty event. Learn about the techniques and tools used for reverse engineering Objective-C apps, and gain insights into common exploitation methods applicable to various macOS applications. Understand the potential large-scale remote exploitation via the web and the implications for security. Discover the presenters' approach to the bounty, their logic in uncovering the flaw, and the steps taken to set up a download server and manipulate packages. Gain valuable knowledge on key takeaways, bug fixes, and the importance of collaboration in security research. Acquire practical skills in reverse engineering and exploiting macOS applications that can be applied beyond Zoom.

Exploiting Zoom on MacOS

Hack In The Box Security Conference
Add to list