Earn Your Business Degree, Tuition-Free, 100% Online!
AI, Data Science & Business Certificates from Google, IBM & Microsoft
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a sophisticated user-to-root local privilege escalation exploit targeting modern macOS systems through this 24-minute conference talk from Objective-See Foundation's OBTS v8.0. Discover how traditional SUID binary exploitation remains viable despite years of security patches and modern exploit mitigations by examining a complex attack chain that leverages four distinct vulnerabilities in mDNSResponder, traceroute6, and libinfo components. Learn about local DNS traffic interception techniques, incorrect privilege dropping mechanisms, ASLR bypass methods, and integer overflow exploitation (CVE-2025-31222, CVE-2025-30440, and CVE-2025-24195). Dive deep into macOS local DNS architecture fundamentals before exploring libmalloc from an exploit development perspective, with particular attention to the architectural differences between Intel and Apple Silicon systems. Master a novel 'region trailer' exploitation technique for libmalloc, refresh your understanding of setuid security pitfalls, and understand methods for bypassing Pointer Authentication Codes (PAC) mitigation to achieve root access. Gain practical insights into modern macOS security assessment and exploit development techniques from an application security engineer's perspective.
Syllabus
#OBTS v8.0: “macOS Privilege Escalation Via Traceroute6” - Paweł Płatek
Taught by
Objective-See Foundation