Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 20-minute conference talk from DEF CON 31 that delves into exploiting MacOS privacy controls through Electron applications. Learn about the TCC (Transparency, Consent, and Control) framework that protects sensitive resources like documents, camera, microphone, and emails on MacOS systems. Discover how to leverage vulnerabilities in Electron apps' default configurations to bypass these privacy restrictions without relying on 0-day exploits. Gain practical insights into executing code within Electron app contexts to inherit their TCC permissions, making it valuable for red team operations. Understand both offensive techniques and defensive measures, as the presentation covers detection strategies for blue teams while introducing a new open-source tool for MacOS security testing.