Power BI Fundamentals - Create visualizations and dashboards from scratch
Start speaking a new language. It’s just 3 weeks away.
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore critical security vulnerabilities in Apple's Mobile Device Management (MDM) ecosystem through this 35-minute Black Hat conference presentation. Dive deep into the seemingly secure process of enterprise device management, where devices purchased from registered retailers automatically integrate with Apple Business Manager and MDM platforms. Learn how attackers can exploit gaps between interconnected systems by reverse engineering the macOS enrollment process, bypassing security controls, and building rogue machines. Discover common misconfigurations that, when combined, can lead to devastating security breaches. Examine how the black box nature of Apple's MDM process can be opened to reveal unexpected attack vectors and security weaknesses. Gain insights into the authentication mechanisms between systems and understand the shared responsibility model for security in enterprise Apple device deployments. Master techniques for identifying and exploiting vulnerabilities in what appears to be an airtight mobile device management solution.
Syllabus
Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments
Taught by
Black Hat