Overview
This course aims to teach learners about memory corruption, system integrity protection, OS X architecture, Mach messaging, exploitation techniques, loading unsigned kexts, and more. The course uses a lecture-based teaching method and is intended for individuals interested in cybersecurity and advanced exploitation techniques.
Syllabus
Intro
System Integrity Protection
Dumb developers...
OS X Architecture
Introduction to Mach
Mach messaging
Execve and friends
Supersonic os x exploitation
Loading unsigned kexts
Conclusions
NEVER FORGET DAVE!
Greetings
Taught by
SyScan360