Главная
Study mode:
on
1
Introduction
2
Apple Scripts Synthetic Events
3
Apples Response
4
macOS Internals
5
Finding the Database
6
Matched Code Requirements
7
Demo
8
Synthetic Events
9
Why not to pick on Apple
10
Apple Bug Bounty Program
11
Preventing Synthetic Clicking
12
Conclusion
Description:
Explore an in-depth analysis of macOS security vulnerabilities in this conference talk from Ekoparty 2019. Delve into Patrick Wardle's research on exploiting a subtle code-signing flaw in macOS that allows unprivileged attackers to programmatically interact with the UI. Learn how this capability can be used to bypass Mojave's security mechanisms with a single synthetic click. Discover the intricacies of Apple Scripts, synthetic events, and macOS internals. Examine the process of finding the database and understanding matched code requirements. Witness a live demonstration of synthetic events and their implications. Gain insights into Apple's bug bounty program and discuss methods for preventing synthetic clicking. Benefit from the expertise of Patrick Wardle, Chief Research Officer at Digita Security and founder of Objective-See, as he shares his extensive knowledge in macOS security.

Synthetically Breaking macOS - Patrick Wardle - Ekoparty Security Conference - 2019

Ekoparty Security Conference
Add to list