Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a 20-minute conference talk from DEF CON 31 that delves into exploiting MacOS privacy controls through Electron applications. Learn about the TCC (Transparency, Consent, and Control) framework that protects sensitive resources like documents, camera, microphone, and emails on MacOS systems. Discover how to leverage vulnerabilities in Electron apps' default configurations to bypass these privacy restrictions without relying on 0-day exploits. Gain practical insights into executing code within Electron app contexts to inherit their TCC permissions, making it valuable for red team operations. Understand both offensive techniques and defensive measures, as the presentation covers detection strategies for blue teams while introducing a new open-source tool for MacOS security testing.
Syllabus
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła
Taught by
DEFCONConference