Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a sophisticated user-to-root local privilege escalation exploit targeting modern macOS systems through this 24-minute conference talk from Objective-See Foundation's OBTS v8.0. Discover how traditional SUID binary exploitation remains viable despite years of security patches and modern exploit mitigations by examining a complex attack chain that leverages four distinct vulnerabilities in mDNSResponder, traceroute6, and libinfo components. Learn about local DNS traffic interception techniques, incorrect privilege dropping mechanisms, ASLR bypass methods, and integer overflow exploitation (CVE-2025-31222, CVE-2025-30440, and CVE-2025-24195). Dive deep into macOS local DNS architecture fundamentals before exploring libmalloc from an exploit development perspective, with particular attention to the architectural differences between Intel and Apple Silicon systems. Master a novel 'region trailer' exploitation technique for libmalloc, refresh your understanding of setuid security pitfalls, and understand methods for bypassing Pointer Authentication Codes (PAC) mitigation to achieve root access. Gain practical insights into modern macOS security assessment and exploit development techniques from an application security engineer's perspective.
Syllabus
#OBTS v8.0: “macOS Privilege Escalation Via Traceroute6” - Paweł Płatek
Taught by
Objective-See Foundation