Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

ATT&CK-Based macOS Purple Team Operations - Dropping Lotus Bombs

Objective-See Foundation via YouTube

Overview

Learn how to execute ATT&CK-based emulation for macOS environments in this conference talk from Objective-See Foundation. Discover the first macOS emulation plan added to the Adversary Emulation Library, focusing on the OceanLotus threat actor scenario. Gain insights into executing ATT&CK techniques, building enterprise detection capabilities, and transforming macOS security into an effective defense system. Follow along as security experts Cat Self and Megan Carney share their three-year community effort to develop red vs. blue team emulation specifically for macOS. Explore topics including GitHub resources, reporting methods, detection strategies, unsigned launch agents, normalized baseline detection, and practical complications when writing to the simulator. Master the tools and techniques needed to strengthen macOS security posture through hands-on adversary emulation and detection engineering.

Syllabus

Introduction
GitHub Resources
Reporting
Detection
Unsigned Launch Agents
Normalized Baseline Detection
Complications
Writing to the Sim
Resources

Taught by

Objective-See Foundation

Reviews

Start your review of ATT&CK-Based macOS Purple Team Operations - Dropping Lotus Bombs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.