Главная
Study mode:
on
1
Intro
2
System Integrity Protection (SIP)
3
System with and without SIP
4
System Integrity Restriction
5
System Integrity Protection Configuration Flags
6
System Integrity Protection User Space Integration
7
System Integrity Protection Sandbox Filters
8
Protection of restricted processes
9
Launch Daemon Protection
10
Boot Arguments that make exploitation easier
11
Triggering Kernel Debugger
12
Abuse of Entitlements via Kernel
Description:
Explore the intricacies of OSX El Capitan's security features in this comprehensive conference talk from SyScan360'16 Singapore. Delve into System Integrity Protection (SIP) and its impact on system security. Examine the differences between systems with and without SIP, and understand the various System Integrity Restriction mechanisms. Learn about SIP Configuration Flags and their role in user space integration. Investigate the implementation of Sandbox Filters and the protection of restricted processes. Analyze the security measures for Launch Daemons and discover potential vulnerabilities in boot arguments. Gain insights into triggering the Kernel Debugger and explore the potential abuse of entitlements via the kernel. This 73-minute presentation offers a deep dive into OSX El Capitan's security architecture, providing valuable knowledge for cybersecurity professionals and enthusiasts alike.

OSX El Capitan - Sinking The Ship

SyScan360
Add to list