Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in Apple's Mobile Device Management (MDM) ecosystem through this 35-minute Black Hat conference presentation. Dive deep into the seemingly secure process of enterprise device management, where devices purchased from registered retailers automatically integrate with Apple Business Manager and MDM platforms. Learn how attackers can exploit gaps between interconnected systems by reverse engineering the macOS enrollment process, bypassing security controls, and building rogue machines. Discover common misconfigurations that, when combined, can lead to devastating security breaches. Examine how the black box nature of Apple's MDM process can be opened to reveal unexpected attack vectors and security weaknesses. Gain insights into the authentication mechanisms between systems and understand the shared responsibility model for security in enterprise Apple device deployments. Master techniques for identifying and exploiting vulnerabilities in what appears to be an airtight mobile device management solution.
Syllabus
Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments
Taught by
Black Hat