Главная
Study mode:
on
1
Intro
2
System Integrity Protection
3
Dumb developers...
4
OS X Architecture
5
Introduction to Mach
6
Mach messaging
7
Execve and friends
8
Supersonic os x exploitation
9
Loading unsigned kexts
10
Conclusions
11
NEVER FORGET DAVE!
12
Greetings
Description:
Dive into advanced OS X exploitation techniques in this comprehensive conference talk from SyScan360'16 Singapore. Explore System Integrity Protection, OS X architecture, and Mach messaging. Learn about execve and related functions, supersonic OS X exploitation methods, and the process of loading unsigned kernel extensions. Gain insights into memory corruption vulnerabilities and their implications for system security. Conclude with key takeaways and a tribute to Dave, emphasizing the importance of staying vigilant in the ever-evolving landscape of cybersecurity.

SyScan360'16 Singapore - Memory Corruption Is For Wussies

SyScan360
Add to list