Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Synthetically Breaking macOS - Patrick Wardle - Ekoparty Security Conference - 2019

Ekoparty Security Conference via YouTube

Overview

Explore an in-depth analysis of macOS security vulnerabilities in this conference talk from Ekoparty 2019. Delve into Patrick Wardle's research on exploiting a subtle code-signing flaw in macOS that allows unprivileged attackers to programmatically interact with the UI. Learn how this capability can be used to bypass Mojave's security mechanisms with a single synthetic click. Discover the intricacies of Apple Scripts, synthetic events, and macOS internals. Examine the process of finding the database and understanding matched code requirements. Witness a live demonstration of synthetic events and their implications. Gain insights into Apple's bug bounty program and discuss methods for preventing synthetic clicking. Benefit from the expertise of Patrick Wardle, Chief Research Officer at Digita Security and founder of Objective-See, as he shares his extensive knowledge in macOS security.

Syllabus

Introduction
Apple Scripts Synthetic Events
Apples Response
macOS Internals
Finding the Database
Matched Code Requirements
Demo
Synthetic Events
Why not to pick on Apple
Apple Bug Bounty Program
Preventing Synthetic Clicking
Conclusion

Taught by

Ekoparty Security Conference

Reviews

Start your review of Synthetically Breaking macOS - Patrick Wardle - Ekoparty Security Conference - 2019

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.