Overview
Explore a comprehensive analysis of macOS Cat Self in this 45-minute conference talk from GrrCON 2019. Delve into the intricacies of art forgery, threat profiling, and the Agile lifecycle as they relate to cybersecurity. Learn about the FancyBear threat actor, information gathering techniques, and the kill chain process. Discover the software development lifecycle, technical reporting, and production environment considerations. Gain insights into red teaming, success metrics, and release scheduling for cybersecurity projects. Understand the importance of discernment and the "Cone of Silence" concept in information security.
Syllabus
Intro
Meet Cat Self
Why Cat Self
Art forgery
Where to start
Agile Lifecycle
Why Fancybear
Threat Profiling
Gathering Information
Kill Chain
Art Foregery
The Cone of Silence
Discernment
Software Development
Technical Report
Production Environment
Binder
Preview
Recreating the work
How I cheated
Test and iterate
Red team
Definition of success
Cost
Release Schedule