AI Product Expert Certification - Master Generative AI Skills
The Perfect Gift: Any Class, Never Expires
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the evolution and current state of dynamic library hijacking attacks on macOS in this comprehensive conference talk from Objective-By-The-Sea v8.0. Delve into the historical context of dylib hijacking vulnerabilities that were once considered Windows-exclusive but were demonstrated to affect macOS over a decade ago. Learn how malicious libraries planted strategically could enable stealthy persistence, process injection, and bypass Apple's core security features. Examine real-world examples of how macOS malware has exploited these techniques throughout the years and understand Apple's aggressive mitigation strategies implemented to counter such attacks. Discover whether dynamic library hijacking remains a viable threat vector in modern macOS environments through live demonstrations, practical detection techniques, and expert analysis. Gain insights from Patrick Wardle's extensive research spanning from his original findings to current macOS security landscapes, complete with historical perspective, technical demonstrations, and actionable security recommendations for protecting Mac systems against these sophisticated attack vectors.
Syllabus
#OBTS v8.0: "Dylib Hijacking on macOS: Dead or Alive?” - Patrick Wardle
Taught by
Objective-See Foundation