SlideShare a Scribd company logo
1 of 110
Download to read offline
I Can Be Apple,
and So Can You
Shakacon 2018
Josh Pitts @midnite_runr
My Background
|
https://github.com/secretsquirrel
https://www.computerworld.com/article/2847549/cyberespionage-group-tied-to-onionduke-malware.html
Outline
• Code signing Basics

• DEMO

• Vulnerability Details

• What about Gatekeeper

• Disclosure process

• How to do signed code checks correctly

• Process of finding this vulnerability

• Q&A
vs
Not Modified Modified
https://commons.wikimedia.org/wiki/File:Windows_logo_-_2012.svg https://commons.wikimedia.org/wiki/File:MacOS_logo.svg
https://commons.wikimedia.org/wiki/File:Windows_logo_-_2012.svg https://commons.wikimedia.org/wiki/File:MacOS_logo.svg
DEMO
• Google Santa - in full lockdown mode; only Apple signed code can run
(native code and macOS app store)

• A malicious binary was delivered via phishing, social engineering, or post
exploitation.

• Persistence and hiding in plain-sight
DEMO
Vulnerability Details
June 12, 2018
https://motherboard.vice.com/en_us/article/evkq3m/apple-macos-malware-okta-research
Conditions for the vulnerability
• Takes advantage of the Fat/Universal binary format

• The first Mach-O in the Fat/Universal file must be signed by Apple, can
be i386, x86_64, or even PPC.

• The malicious binary, or non-Apple supplied code, must be adhoc
signed and i386 compiled for an x86_64 bit target macOS.

• The CPU_TYPE in the Fat header of the Apple binary must be set to an
invalid type or a CPU Type that is not native to the host chipset.
This vulnerability exists in the difference between how the Mach-O loader
loads signed code vs how improperly used Code Signing APIs check signed
code and is exploited via a malformed Universal/Fat Binary.
This vulnerability exists in the difference between how the Mach-O loader
loads signed code vs how improperly used Code Signing APIs check signed
code and is exploited via a malformed Universal/Fat Binary.
$ file /bin/sync
/bin/sync: Mach-O universal binary with 2 architectures: [x86_64:Mach-O 64-bit executable x86_64]
[i386:Mach-O executable i386]
/bin/sync (for architecture x86_64): Mach-O 64-bit executable x86_64
/bin/sync (for architecture i386): Mach-O executable i386
$ file /bin/sync
/bin/sync: Mach-O universal binary with 2 architectures: [x86_64:Mach-O 64-bit executable x86_64]
[i386:Mach-O executable i386]
/bin/sync (for architecture x86_64): Mach-O 64-bit executable x86_64
/bin/sync (for architecture i386): Mach-O executable i386
$ file /bin/sync
/bin/sync: Mach-O universal binary with 2 architectures: [x86_64:Mach-O 64-bit executable x86_64]
[i386:Mach-O executable i386]
/bin/sync (for architecture x86_64): Mach-O 64-bit executable x86_64
/bin/sync (for architecture i386): Mach-O executable i386
This vulnerability exists in the difference between how the Mach-O loader
loads code vs how improperly used Code Signing APIs check signed
code and is exploited via a malformed Universal/Fat Binary.
$lipo -create python.x86_64 ncat.i386 -output ncat.frankenstein
What vendors were affected?
Test Samples
Sample Name Notes
bash_not_signed Sample not signed, malformed header
Bash_ppc_adhoc PPC, adhoc signed, non-malformed header
Bash_adhoc Adhoc signed, malformed header
Terminal.app
Application Bundle, Adhoc signed, malformed
header
https://github.com/OktaSecurityLabs/CodeSigningSamples
F-Secure LittleFlocker/xFence
CVE-2018-10403
F-Secure LittleFlocker/xFence
CVE-2018-10403
F-Secure LittleFlocker/xFence
CVE-2018-10403
Objective-See (Multiple)
CVE-2018-10404
Objective-See (Multiple)
CVE-2018-10404
Objective-See (Multiple)
CVE-2018-10404
Google - Santa, molcodesignchecker
CVE-2018-10405
Google - Santa, molcodesignchecker
CVE-2018-10405
Google - Santa, molcodesignchecker
CVE-2018-10405
Google - Santa, molcodesignchecker
CVE-2018-10405
Google - Santa, molcodesignchecker
CVE-2018-10405
Yelp - OSXCollector
CVE-2018-10406
Carbon Black - Cb Response
CVE-2018-10407
VirusTotal
CVE-2018-10408
Facebook - OSQuery
CVE-2018-6336
Objective Development - LittleSnitch
CVE-2018-10470
Objective Development - LittleSnitch
CVE-2018-10470
Objective Development - LittleSnitch
CVE-2018-10470
What about Gatekeeper?
How Apple Sees Gatekeeper
https://en.wikipedia.org/wiki/Gatekeeper_(macOS)#/media/File:Gatekeeper_logo.png
How I See Gatekeeper
http://www.dippylisty.com/contentdippyimages/2228.jpg
How I See Gatekeeper
http://www.dippylisty.com/contentdippyimages/2228.jpg
https://www.slideshare.net/Synack/gatekeeper-exposed
Protect Bypass
Protect
• App Bundles and DMGs via
browser
Bypass
Protect
• App Bundles and DMGs via
browser
• Standalone Mach-Os (no
Bundles) <— My preference
Bypass
Protect
• App Bundles and DMGs via
browser
• Zipped (.zip) App Bundles via
browser (unless the user uses 7z
to decompress 🤔)
• Standalone Mach-Os (no
Bundles) <— My preference
Bypass
Protect
• App Bundles and DMGs via
browser
• Zipped (.zip) App Bundles via
browser (unless the user uses 7z
to decompress 🤔)
• Standalone Mach-Os (no
Bundles) <— My preference
• 7z the App Bundle then via
browser
Bypass
Protect
• App Bundles and DMGs via
browser
• Zipped (.zip) App Bundles via
browser (unless the user uses 7z
to decompress 🤔)
• Tar’ed App Bundles via browser
(unless 7z is used again)
• Standalone Mach-Os (no
Bundles) <— My preference
• 7z the App Bundle then via
browser
Bypass
Protect
• App Bundles and DMGs via
browser
• Zipped (.zip) App Bundles via
browser (unless the user uses 7z
to decompress 🤔)
• Tar’ed App Bundles via browser
(unless 7z is used again)
• Standalone Mach-Os (no
Bundles) <— My preference
• 7z the App Bundle then via
browser
• If the user uses curl or wget on a
zip/7z/tar’ed file
Bypass
Protect
• App Bundles and DMGs via
browser
• Zipped (.zip) App Bundles via
browser (unless the user uses 7z
to decompress 🤔)
• Tar’ed App Bundles via browser
(unless 7z is used again)
• Standalone Mach-Os (no
Bundles) <— My preference
• 7z the App Bundle then via
browser
• If the user uses curl or wget on a
zip/7z/tar’ed file
• App Bundle on a USB
Bypass
Contacting Apple
Timeline
Timeline
• Feb 22, 2018 - Sent an initial sample to apple where the ‘malicious’ code was not signed.
Timeline
• Feb 22, 2018 - Sent an initial sample to apple where the ‘malicious’ code was not signed.
• March 1, 2018 - Product Security provides a recommendation to catch this.
Timeline
• Feb 22, 2018 - Sent an initial sample to apple where the ‘malicious’ code was not signed.
• March 1, 2018 - Product Security provides a recommendation to catch this.
• March 6, 2018 - I provide a sample that bypasses their recommendations.
Timeline
• Feb 22, 2018 - Sent an initial sample to apple where the ‘malicious’ code was not signed.
• March 1, 2018 - Product Security provides a recommendation to catch this.
• March 6, 2018 - I provide a sample that bypasses their recommendations.
• March 20, 2018 - Product Security provides another recommendation that doesn’t solve
the issue.
Timeline
• Feb 22, 2018 - Sent an initial sample to apple where the ‘malicious’ code was not signed.
• March 1, 2018 - Product Security provides a recommendation to catch this.
• March 6, 2018 - I provide a sample that bypasses their recommendations.
• March 20, 2018 - Product Security provides another recommendation that doesn’t solve
the issue.
• March 21, 2018 - I respond with a workflow how to solve the issue with a hope they will
address the issue.
Timeline
• Feb 22, 2018 - Sent an initial sample to apple where the ‘malicious’ code was not signed.
• March 1, 2018 - Product Security provides a recommendation to catch this.
• March 6, 2018 - I provide a sample that bypasses their recommendations.
• March 20, 2018 - Product Security provides another recommendation that doesn’t solve
the issue.
• March 21, 2018 - I respond with a workflow how to solve the issue with a hope they will
address the issue.
• March 29, 2018 - Product Security states that third party developers will have to address
the issue and documentation will be updated.
Is Apple Vulnerable?
¯_(ツ)_/¯
Developer Reactions
“WTF”
“God help anyone using these
APIs”
Timeline
• April 9, 2018 - Known affected third party developers contacted

• April 18, 2018 - CERT/CC recommends a blog post for full exposure

• June 12, 2018 - Public disclosure https://www.okta.com/security-blog/
2018/06/issues-around-third-party-apple-code-signing-checks/
June 9, 2018
SecStaticCodeCheckValidity API Documentation
https://webcache.googleusercontent.com/search?q=cache:1mpf6FhZY6YJ:https://developer.apple.com/documentation/security/1395784-secstaticcodecheckvalidity+&cd=1&hl=en&ct=clnk&gl=us
Sometime after June 12th
SecStaticCodeCheckValidity API Documentation
https://webcache.googleusercontent.com/search?q=cache:QWANld5WHeAJ:https://developer.apple.com
Sometime after June 12th
SecStaticCodeCheckValidity API Documentation
https://webcache.googleusercontent.com/search?q=cache:QWANld5WHeAJ:https://developer.apple.com
How do we do signed code
checks on macOS correctly?
Non-developer or command line
• $ codesign -vv -R=“anchor apple” ./some.app or <pid>
• $ codesign -vv -R=“anchor apple” ./some.app or <pid>
• $ codesign -vv -R=“anchor apple generic” ./some.app or <pid>
• $ codesign -vv -R=“anchor apple” ./some.app or <pid>
• $ codesign -vv -R=“anchor apple generic” ./some.app or <pid>
• $ lipo -thin x86_64 login -output login.x64 # <— then check this…
Developer
It Depends
• Use the SecRequirementCreateWithString and pass “anchor apple” or
“anchor apple generic”

• Use SecStaticCodeCheckValidity with kSecCSDefaultFlags |
kSecCSCheckNestedCode | kSecCSCheckAllArchitectures |
kSecCSEnforceRevocationChecks flags

• Then you could still need to break out each slice in the FAT file to ensure
they are the same signer!
https://github.com/objective-see/WhatsYourSign/blob/29aec698696d58cb1d1d6f0cc9dbeb0340d6bd78/WhatsYourSignExt/FinderSync/Signing.m#L324
https://github.com/objective-see/WhatsYourSign/blob/29aec698696d58cb1d1d6f0cc9dbeb0340d6bd78/WhatsYourSignExt/FinderSync/Signing.m#L334
Discovery Process
Backstory - 2015
https://support.apple.com/en-us/HT204942
ShmooCon 2016
“Hiding from the Investigator”
Remember the Fat File?
Dec 21, 2017
February 13, 2018
Remember Lipo?
$lipo -create i386 i386 -output frankenstein
FAIL
FAIL
$ lipo -create bash.x64 python.x64 -output ./bash_python
fatal error:/usr/bin/lipo: bash.x64 and python.x64 have the same architectures
(x86_64) and can't be in the same fat output file
FAIL
$ lipo -create bash.x64 python.x64 -output ./bash_python
fatal error:/usr/bin/lipo: bash.x64 and python.x64 have the same architectures
(x86_64) and can't be in the same fat output file
$ ./bash_python
bash: ./bash_python: Malformed Mach-o file
http://viralviralvideos.com/wp-content/uploads/GIF/2014/08/GIF-clint-eastwood-happy-interested-pleased-satisfied-yes-GIF.gif
http://viralviralvideos.com/wp-content/uploads/GIF/2014/08/GIF-clint-eastwood-happy-interested-pleased-satisfied-yes-GIF.gif
FIN
https://pixel.nymag.com/imgs/daily/selectall/2017/07/17/robotsuicide.w710.h473.png
Questions?
@midnite_runr
https://github.com/secretsquirrel
https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/

More Related Content

What's hot

Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
Shakacon
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Zoltan Balazs
 

What's hot (20)

Appsec DC - wXf -2010
Appsec DC - wXf  -2010Appsec DC - wXf  -2010
Appsec DC - wXf -2010
 
Nginx warhead
Nginx warheadNginx warhead
Nginx warhead
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
 
DevOops & How I hacked you DevopsDays DC June 2015
DevOops & How I hacked you DevopsDays DC June 2015DevOops & How I hacked you DevopsDays DC June 2015
DevOops & How I hacked you DevopsDays DC June 2015
 
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware TriageЭкспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
 
Windows attacks - AT is the new black
Windows attacks - AT is the new blackWindows attacks - AT is the new black
Windows attacks - AT is the new black
 
How to convince a malware to avoid us
How to convince a malware to avoid usHow to convince a malware to avoid us
How to convince a malware to avoid us
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
 
Automate Yo'self -- SeaGL
Automate Yo'self -- SeaGL Automate Yo'self -- SeaGL
Automate Yo'self -- SeaGL
 
A Forgotten HTTP Invisibility Cloak
A Forgotten HTTP Invisibility CloakA Forgotten HTTP Invisibility Cloak
A Forgotten HTTP Invisibility Cloak
 
Running and Scaling Magento on AWS
Running and Scaling Magento on AWSRunning and Scaling Magento on AWS
Running and Scaling Magento on AWS
 
Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014
 
Devoops: DoJ Annual Cybersecurity Training Symposium Edition 2015
Devoops: DoJ Annual Cybersecurity Training Symposium Edition 2015Devoops: DoJ Annual Cybersecurity Training Symposium Edition 2015
Devoops: DoJ Annual Cybersecurity Training Symposium Edition 2015
 
Hacking Windows 95 #33c3
Hacking Windows 95 #33c3Hacking Windows 95 #33c3
Hacking Windows 95 #33c3
 
Windows Attacks AT is the new black
Windows Attacks   AT is the new blackWindows Attacks   AT is the new black
Windows Attacks AT is the new black
 
Cross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitation
 
Racing The Web - Hackfest 2016
Racing The Web - Hackfest 2016Racing The Web - Hackfest 2016
Racing The Web - Hackfest 2016
 

Similar to I can be apple and so can you

михаил дударев
михаил дударевмихаил дударев
михаил дударев
apps4allru
 

Similar to I can be apple and so can you (20)

Android reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skypeAndroid reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skype
 
Tech Webinar: Offline First: Creare un'app Phonegap che funzioni offline e si...
Tech Webinar: Offline First: Creare un'app Phonegap che funzioni offline e si...Tech Webinar: Offline First: Creare un'app Phonegap che funzioni offline e si...
Tech Webinar: Offline First: Creare un'app Phonegap che funzioni offline e si...
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments
 
Creating Developer-Friendly Docker Containers with Chaperone
Creating Developer-Friendly Docker Containers with ChaperoneCreating Developer-Friendly Docker Containers with Chaperone
Creating Developer-Friendly Docker Containers with Chaperone
 
Manual JavaScript Analysis Is A Bug
Manual JavaScript Analysis Is A BugManual JavaScript Analysis Is A Bug
Manual JavaScript Analysis Is A Bug
 
Pwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreakPwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreak
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Infrastructure is development
Infrastructure is developmentInfrastructure is development
Infrastructure is development
 
михаил дударев
михаил дударевмихаил дударев
михаил дударев
 
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
 
[drupalday2017] - Speed-up your Drupal instance!
[drupalday2017] - Speed-up your Drupal instance![drupalday2017] - Speed-up your Drupal instance!
[drupalday2017] - Speed-up your Drupal instance!
 
Speed up your Drupal instance!!
Speed up your Drupal instance!!Speed up your Drupal instance!!
Speed up your Drupal instance!!
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Continuous Security for GitOps
Continuous Security for GitOpsContinuous Security for GitOps
Continuous Security for GitOps
 
Hands On With OpenSocial and Embedded Experiences
Hands On With OpenSocial and Embedded ExperiencesHands On With OpenSocial and Embedded Experiences
Hands On With OpenSocial and Embedded Experiences
 
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
Unlocking the Power of ChatGPT and AI in Testing - NextSteps, presented by Ap...
 
US23_Daniels.pptx
US23_Daniels.pptxUS23_Daniels.pptx
US23_Daniels.pptx
 
We are Digital Puppets
We are Digital PuppetsWe are Digital Puppets
We are Digital Puppets
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
 

More from Shakacon

A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
Shakacon
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
Shakacon
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
Shakacon
 
Making a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem DinaburgMaking a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem Dinaburg
Shakacon
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Shakacon
 

More from Shakacon (20)

Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
Shamoon
ShamoonShamoon
Shamoon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest Network
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI Catcher
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving Malware
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnelling
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul Rascagneres
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
 
Swift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzSwift Reversing by Ryan Stortz
Swift Reversing by Ryan Stortz
 
Making a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem DinaburgMaking a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem Dinaburg
 
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph MennHunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
 
Let's Play Doctor....by Patrick Wardle
Let's Play Doctor....by Patrick WardleLet's Play Doctor....by Patrick Wardle
Let's Play Doctor....by Patrick Wardle
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

I can be apple and so can you