Dive into advanced OS X exploitation techniques in this comprehensive conference talk from SyScan360'16 Singapore. Explore System Integrity Protection, OS X architecture, and Mach messaging. Learn about execve and related functions, supersonic OS X exploitation methods, and the process of loading unsigned kernel extensions. Gain insights into memory corruption vulnerabilities and their implications for system security. Conclude with key takeaways and a tribute to Dave, emphasizing the importance of staying vigilant in the ever-evolving landscape of cybersecurity.
SyScan360'16 Singapore - Memory Corruption Is For Wussies