Posted on
in Presentations
Real-world case studies of advanced intrusions on MacOS systems, with detailed breakdown of TTPs and artifacts. In the typical raw Hacking Exposed style, the session will demonstrate these attacks and provide relevant countermeasures for detection and response. Reprising their appearance again this year are also the must-see Adversary Oscars.
Learning Objectives:
1: Learn what the different attacker TTPs are on MacOS systems.
2: Understand how the macOS process visualization trees can be used for forensics.
3: Understand how both static and behavioral indicators are relevant to intrusions.
Pre-Requisites:
Understand basic hacking tools and techniques.
Learning Objectives:
1: Learn what the different attacker TTPs are on MacOS systems.
2: Understand how the macOS process visualization trees can be used for forensics.
3: Understand how both static and behavioral indicators are relevant to intrusions.
Pre-Requisites:
Understand basic hacking tools and techniques.
Share With Your Community