Self-Signed Certificates: Exploiting Insecure Certificate Validation in iOS and macOS

Self-Signed Certificates: Exploiting Insecure Certificate Validation in iOS and macOS

nullcon via YouTube Direct link

Penetration testers & Bug bounty hunters

5 of 6

5 of 6

Penetration testers & Bug bounty hunters

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Self-Signed Certificates: Exploiting Insecure Certificate Validation in iOS and macOS

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Certificates
  3. 3 Certmitm demo
  4. 4 Apple CVEs
  5. 5 Penetration testers & Bug bounty hunters
  6. 6 Apple

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.