Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in Apple's Mobile Device Management (MDM) ecosystem through this 35-minute Black Hat conference presentation. Dive deep into the seemingly secure process of enterprise device management, where devices purchased from registered retailers automatically integrate with Apple Business Manager and MDM platforms. Learn how attackers can exploit gaps between interconnected systems by reverse engineering the macOS enrollment process, bypassing security controls, and building rogue machines. Discover common misconfigurations that, when combined, can lead to devastating security breaches. Examine how the black box nature of Apple's MDM process can be opened to reveal unexpected attack vectors and security weaknesses. Gain insights into the authentication mechanisms between systems and understand the shared responsibility model for security in enterprise Apple device deployments. Master techniques for identifying and exploiting vulnerabilities in what appears to be an airtight mobile device management solution.

Syllabus

Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments

Taught by

Black Hat

Reviews

Start your review of Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.