Dive into advanced OS X exploitation techniques in this comprehensive conference talk from SyScan360'16 Singapore. Explore System Integrity Protection, OS X architecture, and Mach messaging. Learn about execve and related functions, supersonic OS X exploitation methods, and the process of loading unsigned kernel extensions. Gain insights into memory corruption vulnerabilities and their implications for system security. Conclude with key takeaways and a tribute to Dave, emphasizing the importance of staying vigilant in the ever-evolving landscape of cybersecurity.
Overview
Syllabus
Intro
System Integrity Protection
Dumb developers...
OS X Architecture
Introduction to Mach
Mach messaging
Execve and friends
Supersonic os x exploitation
Loading unsigned kexts
Conclusions
NEVER FORGET DAVE!
Greetings
Taught by
SyScan360