SlideShare a Scribd company logo
1 of 69
Download to read offline
Launch and Environment
Constraints Overview Deep Dive
Csaba Fitzl
Twitter: @theevilbit
whoami
🍌lead content developer of
"EXP-312: Advanced macOS Control
Bypasses"
@ OffSec
🍌ex red/blue teamer
🍌macOS bug hunter
🍌husband, father
🍌hiking, trail running 🥾 🏔🏃
Europe's largest banana producer is:
agenda
1. old macOS vulnerabilities
2. Launch Constraints (Ventura)
3. old and current third party vulnerabilities
4. Launch and Environment constraints (Sonoma)
old macOS vulnerabilities
TCC bypass with imagent.app
TCC bypass with imagent.app
🍌Found by Adam Chester (@_xpn_)
🍌imagent.app with TCC and keychain
related entitlements
🍌loads plugins from:
🍌imagent.app/Contents/PlugIns
🍌code signing allows 3rd party plugins
🍌copy app to /tmp/ and load your plugin
TCC bypass using Directory
Utility.app, CVE-2020-27937
TCC bypass using Directory Utility.app, CVE-2020-27937
🍌found by Wojciech Regula (@_r3ggi)
🍌Directory Utility with admin rights to
change user properties, like HOME
🍌allows plugins including non Apple
🍌copy app to /tmp/ and load our plugin
🍌change HOME -> new TCC.db -> our
rules
TCC bypass using con
fi
gd,
"powerdir"
TCC bypass using con
fi
gd, "powerdir"
🍌Found by Jonathan Bar Or
(@yo_yo_yo_jbo)
🍌con
fi
gd has again user update rights (can
change HOME)
🍌-b allows loading an bundle (including
non Apple)
🍌normally launched by launchd but we
could start it via command line as well
Introducing Launch
Constraints
Launch Constraints
🍌introduced in macOS Ventura (13)
🍌mitigates many logic vulnerabilities
🍌de
fi
nes 3 constraints:
🍌Self Constraints
🍌Parent Constraints
🍌Responsible Constraints
LC in Action
Launch Constraints Categories
LC Categories
🍌category = de
fi
nes a set of launch constraints
🍌Ventura - 7 categories - documented by Linus Henze
🍌Sonoma - 18 categories - documented by Csaba Fitzl
🍌assigns each binary in the trust cache to a category
LC Category examples
🍌on-authorized-authapfs-volume || on-system-
volume - System or Cryptex
🍌launch-type == 1 - system service
🍌validation-category == 1 - must present in the
trust cache
🍌is-init-proc - launchd
LC Category examples
🍌on-authorized-authapfs-volume || on-
system-volume - System or Cryptex
🍌less restrictive
trust cache
Trust Cache
🍌A few places:
🍌/System/Library/Security/OSLaunchPolicyData
🍌/System/Volumes/Preboot/[uuid]/boot/[long hex]/usr/standalone/
fi
rmware/
FUD/BaseSystemTrustCache.img4
🍌/System/Volumes/Preboot/[uuid]/boot/[long hex]/usr/standalone/
fi
rmware/
FUD/StaticTrustCache.img4
🍌IMG4 and IM4P (P = Payload)
fi
les
Trust Cache
🍌IMG4 - extract IM4P
🍌IM4P - extract data
🍌pyimg4 Python
utility
Trust Cache
🍌TC v2 can contain constraint
category
🍌trustcache utility to analyze it
🍌category: 4th column
reversing launch constraints
reversing LC
🍌de
fi
ned in AMFI
(AppleMobileFileIntegrity)
🍌download KDK to get the KEXT
🍌symbols with kConstraintCategory*
pre
fi
x
🍌extract symbols from KEXT
7075020101B07030420C03246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D65
0101FF30100C0B6C61756E63682D7479706502010130180C1376616C69646174696F6E2D63617465676F72790201017049020101B04430420C03246F72B03B30220C1D6F6E2D6175
74686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF708183020101B07E30420C03246F72B03B30220C1D6F
6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF301E0C0B6C61756E63682D74797065B00F30
0D0C0324696E300602010002010130180C1376616C69646174696F6E2D63617465676F7279020101708183020101B07E30420C03246F72B03B30220C1D6F6E2D617574686F72697A
65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF301E0C0B6C61756E63682D74797065B00F300D0C0324696E30060201
0002010130180C1376616C69646174696F6E2D63617465676F7279020101701F020101B01A30180C1376616C69646174696F6E2D63617465676F72790201017081B2020101B081AC
307E0C03246F72B07730230C1E696E2D74632D776974682D636F6E73747261696E742D63617465676F727901010030150C1069732D7369702D70726F7465637465640101FF30220C
1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF30100C0B6C61756E63682D7479706502
010130180C1376616C69646174696F6E2D63617465676F7279020101701F020101B01A30180C1376616C69646174696F6E2D63617465676F72790201017075020101B07030420C03
246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF30100C0B6C61756E
63682D7479706502010230180C1376616C69646174696F6E2D63617465676F7279020101708199020101B0819330420C03246F72B03B30220C1D6F6E2D617574686F72697A65642D
61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF30130C0E6170706C652D696E7465726E616C0101FF301E0C0B6C61756E6368
2D74797065B00F300D0C0324696E300602010002010230180C1376616C69646174696F6E2D63617465676F7279020101708183020101B07E30420C03246F72B03B30220C1D6F6E2D
617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF301E0C0B6C61756E63682D74797065B00F300D0C
0324696E300602010002010230180C1376616C69646174696F6E2D63617465676F7279020101708187020101B0818130420C03246F72B03B30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF30210C0B6C61756E63682D74797065B01230100C0324696E3009020100
02010102010230180C1376616C69646174696F6E2D63617465676F7279020101703F020101B03A301E0C0B6C61756E63682D74797065B00F300D0C0324696E300602010002010230
180C1376616C69646174696F6E2D63617465676F72790201017075020101B07030420C03246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C75
6D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF30100C0B6C61756E63682D7479706502010330180C1376616C69646174696F6E2D63617465676F7279020101
708183020101B07E30420C03246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D
650101FF301E0C0B6C61756E63682D74797065B00F300D0C0324696E300602010102010330180C1376616C69646174696F6E2D63617465676F72790201017031020101B02C30100C
0B6C61756E63682D7479706502010330180C1376616C69646174696F6E2D63617465676F72790201017081B7020101B081B130819C0C03246F72B08194307D0C0424616E64B07530
590C03246F72B05230150C1069732D7369702D70726F7465637465640101FF30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F
6E2D73797374656D2D766F6C756D650101FF30180C1376616C69646174696F6E2D63617465676F727902010130130C0E6170706C652D696E7465726E616C0101FF30100C0B6C6175
6E63682D747970650201027078020101B07330420C03246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D7379
7374656D2D766F6C756D650101FF30130C0E646576656C6F7065722D6D6F64650101FF30180C1376616C69646174696F6E2D63617465676F7279020101708187020101B081813042
0C03246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF30150C106F6E2D73797374656D2D766F6C756D650101FF30210C0B6C61
756E63682D74797065B01230100C0324696E300902010002010102010330180C1376616C69646174696F6E2D63617465676F72790201017018020101B01330110C0C69732D696E69
742D70726F630101FF70818A020101B081843081810C03246F72B07A30650C0424616E64B05D30150C106F6E2D73797374656D2D766F6C756D650101FF302A0C127369676E696E67
2D6964656E7469666965720C14636F6D2E6170706C652E6D62666C6F6167656E7430180C1376616C69646174696F6E2D63617465676F727902010130110C0C69732D696E69742D70
726F630101FF70818A020101B081843081810C03246F72B07A30650C0424616E64B05D30150C106F6E2D73797374656D2D766F6C756D650101FF302A0C127369676E696E672D6964
656E7469666965720C14636F6D2E6170706C652E6D62666C6F6167656E7430180C1376616C69646174696F6E2D63617465676F727902010130110C0C69732D696E69742D70726F63
0101FF70819A020101B081943081910C03246F72B0818930740C0424616E64B06C30130C0E6170706C652D696E7465726E616C0101FF30550C0C656E7469746C656D656E7473B045
30430C062471756572793039302F0201010C2A636F6D2E6170706C652E707269766174652E7365742D6C61756E63682D747970652E696E7465726E616C300602010A02010130110C
0C69732D696E69742D70726F630101FF7081B4020101B081AE30420C03246F72B03B30220C1D6F6E2D617574686F72697A65642D61757468617066732D766F6C756D650101FF3015
0C106F6E2D73797374656D2D766F6C756D650101FF304E0C127369676E696E672D6964656E746966696572B03830360C0324696E302F0C15636F6D2E6170706C652E737973646961
676E6F73650C16636F6D2E6170706C652E737973646961676E6F73656430180C1376616C69646174696F6E2D63617465676F72790201017018020101B01330110C0C69732D696E69
742D70726F630101FF7018020101B01330110C0C69732D696E69742D70726F630101FF7018020101B01330110C0C69732D696E69742D70726F630101FF7081A0020101B0819A3081
970C03246F72B0818F30780C0424616E64B07030540C03246F72B04D30110C0C69732D696E69742D70726F630101FF30380C127369676E696E672D6964656E7469666965720C2263
6F6D2E6170706C652E436F72654465766963652E6474646562756770726F78796430180C1376616C69646174696F6E2D63617465676F727902010130130C0E6170706C652D696E74
65726E616C0101FF
reversing LC
🍌ASN.1 DER encoded data (serialized)
🍌many tools which can decode it, like python-asn1
🍌DER encoding:
🍌Type
🍌Length
🍌Value
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
DER decoding example
7075020101B07030420C03246F72B03B
30220C1D6F6E2D617574686F72697A65
642D61757468617066732D766F6C756D
650101FF30150C106F6E2D7379737465
6D2D766F6C756D650101FF30100C0B6C
61756E63682D7479706502010130180C
1376616C69646174696F6E2D63617465
676F7279020101
[A] SEQUENCE
[U] INTEGER: 1
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: $or
[C] SEQUENCE
[U] SEQUENCE
[U] UTF8STRING: on-authorized-authapfs-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: on-system-volume
[U] BOOLEAN: True
[U] SEQUENCE
[U] UTF8STRING: launch-type
[U] INTEGER: 1
[U] SEQUENCE
[U] UTF8STRING: validation-category
[U] INTEGER: 1
(on-authorized-authapfs-volume || on-system-volume) && launch-type == 1 && validation-category == 1
attack mitigation
LC attack mitigation
🍌imagent.app & Directory Utility.app
🍌(on-authorized-authapfs-volume || on-system-volume)
🍌wouldn't be able to start a copy
🍌con
fi
gd
🍌Parent Constraint: is-init-proc + system service
🍌wouldn't be able to start from command line
typical third party attacks
XPC attacks
🍌many blog post series from Wojciech Regula, Csaba Fitzl and others
🍌XPC services which run as root are dangerous
🍌XPC service must ensure that only the real client can connect
🍌client validation is hard not straightforward
🍌must use audit token
🍌client must be signed by developer certi
fi
cate issued by Apple
🍌client's version must be checked and / or
🍌client shouldn't posses dangerous entitlements (e.g.: com.apple.security.cs.disable-
library-validation)
Electron framework attacks
🍌Electron based apps are popular (Chrome, Signal, Slack, Discord, MS Teams, ...)
🍌often have TCC permissions (Camera, Microphone, ...)
🍌subject to injection attacks (local attack are not in their threat model)
🍌ELECTRON_RUN_AS_NODE - allows node.js cli interaction
🍌can be disabled
🍌arguments: --inspect and --remote-debugging-port - allow debugger
attachment
🍌--remote-debugging-port can't be disabled
dylib injection
🍌if "com.apple.security.cs.disable-library-validation" present
🍌often used if third party plugins must be supported
🍌opens up the attack surface for XPC and TCC bypasses
🍌-> can inject code into the clients
Launch and Environment
Constraints (for 3rd parties)
“In this talk I will talk about two mitigations which Apple
introduced in order to protect against many types of logic
vulnerabilities. Launch Constraints was introduced in macOS
Ventura, and they can control who can launch a built-in system
application and how. Environment Constraints were introduced in
Sonoma, and it's basically the extension of Launch Constraints for
third party apps. These two features are probably the most
impactful when it comes to exploitation. I will review them in
detail, how they are set up, what they do exactly, and what kind of
vulnerability classes they mitigate. I will also go through a couple
of past vulnerabilities, which could not have been exploited with
these constraints present. Finally I will walk through how various
third party apps should be set up in order to be secure.”
–Csaba Fitzl
“In this talk I will talk about two mitigations which Apple
introduced in order to protect against many types of logic
vulnerabilities. Launch Constraints was introduced in macOS
Ventura, and they can control who can launch a built-in system
application and how. Environment Constraints were introduced in
Sonoma, and it's basically the extension of Launch Constraints for
third party apps. These two features are probably the most
impactful when it comes to exploitation. I will review them in
detail, how they are set up, what they do exactly, and what kind of
vulnerability classes they mitigate. I will also go through a couple
of past vulnerabilities, which could not have been exploited with
these constraints present. Finally I will walk through how various
third party apps should be set up in order to be secure.”
–Csaba Fitzl
“In this talk I will talk about two mitigations which Apple
introduced in order to protect against many types of logic
vulnerabilities. Launch Constraints was introduced in macOS
Ventura, and they can control who can launch a built-in system
application and how. Environment Constraints were introduced in
Sonoma, and it's basically the extension of Launch Constraints for
third party apps. These two features are probably the most
impactful when it comes to exploitation. I will review them in
detail, how they are set up, what they do exactly, and what kind of
vulnerability classes they mitigate. I will also go through a couple
of past vulnerabilities, which could not have been exploited with
these constraints present. Finally I will walk through how various
third party apps should be set up in order to be secure. rant about
how Apple failed big time with LC for third parties”
–Csaba Fitzl
intro
🍌now LC available for 3rd party apps
🍌can de
fi
ne all 3 constraints (self, parent,
responsible)
🍌additionally +1 library load constraint
🍌de
fi
ned in code requirement in Xcode
🍌well documented in Apple Developer
Documentation
XPC "protection"
🍌sounds like LC makes XPC secure
🍌but!!!
🍌but!!!
🍌if the service is already running then
what? - LC is not in play
🍌+bug: responsible process: XPC
service itself, not the client 🤦
(FB13206884)
"Now let's walk through some process relationships and talk about
how you can use launch constraints to secure them. First assume
that MyDemo.app is your app. You can set a self constraint on my
MyDemo.app to require that it launch as an application from
Launch Services. When your app requests a connection to your
XPC service, launchd spawns the XPC service and is the parent of
that XPC service but your app is "responsible" for that XPC service.
You could set a responsible process constraint on
MyXPCDemo.xpc to indicate that only MyDemo.app should be
responsible for it." *
* WWDC2023: Protect your Mac app with
environment constraints
not exactly :-(
YOU HAD ONE JOB!
"Securing" Electron applications
🍌posix_spawn is dangerous
🍌launch type = 3 = launch as
application
🍌but!!!
🍌but!!!
🍌open command launches as
application
🍌can pass env vars and arguments
"Just like in real parent-child relationships, parent processes have
a huge amount of in
fl
uence over how a child behaves. On macOS,
the power to posix_spawn another process gives the parent the
ability to control nearly all input to the child. The parent process
can also limit the child’s access to system resources. This level of
control can cause the child to load unexpected code, to run
unexpected features, or to behave in ways that make the process
more vulnerable to attack." *
* WWDC2023: Protect your Mac app with
environment constraints
"Securing" Electron applications
or just use the API
my other issues
🍌Apple's WWDC example: command line helper tool
🍌anyone uses that anymore?
🍌usual recommendation is XPC for the past (10?) years
🍌doesn't feel real-world
YOU HAD ONE JOB!
library load constraints
🍌if you used "com.apple.security.cs.disable-library-validation"
🍌solves third party plugin support issues
🍌problem:
🍌assumes you are aware of all the plugins
conclusion
conclusion
🍌LC for Apple binaries
🍌great improvement
🍌mitigates many common attacks
🍌LC for 3rd parties
🍌there is potential, but needs improvement
🍌currently doesn't impact the most common attacks
🍌library load constraints can be useful
🍌start to use it
Csaba Fitzl
Twitter: @theevilbit
Resources
•
fl
aticon.com - Freepik, rsetiawan

More Related Content

What's hot

PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜
PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜
PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜Preferred Networks
 
Redmineとgitの 連携利用事例
Redmineとgitの 連携利用事例Redmineとgitの 連携利用事例
Redmineとgitの 連携利用事例Tomohisa Kusukawa
 
1075: .NETからCUDAを使うひとつの方法
1075: .NETからCUDAを使うひとつの方法1075: .NETからCUDAを使うひとつの方法
1075: .NETからCUDAを使うひとつの方法NVIDIA Japan
 
Git超入門_座学編.pdf
Git超入門_座学編.pdfGit超入門_座学編.pdf
Git超入門_座学編.pdf憲昭 村田
 
日本語テストメソッドについて
日本語テストメソッドについて日本語テストメソッドについて
日本語テストメソッドについてkumake
 
ドメイン駆動設計という設計スタイル
ドメイン駆動設計という設計スタイルドメイン駆動設計という設計スタイル
ドメイン駆動設計という設計スタイル増田 亨
 
Redmine にいろいろ埋め込んでみた
Redmine にいろいろ埋め込んでみたRedmine にいろいろ埋め込んでみた
Redmine にいろいろ埋め込んでみたKohei Nakamura
 
Goの時刻に関するテスト
Goの時刻に関するテストGoの時刻に関するテスト
Goの時刻に関するテストKentaro Kawano
 
リーンなコードを書こう:実践的なオブジェクト指向設計
リーンなコードを書こう:実践的なオブジェクト指向設計リーンなコードを書こう:実践的なオブジェクト指向設計
リーンなコードを書こう:実践的なオブジェクト指向設計増田 亨
 
SQL大量発行処理をいかにして高速化するか
SQL大量発行処理をいかにして高速化するかSQL大量発行処理をいかにして高速化するか
SQL大量発行処理をいかにして高速化するかShogo Wakayama
 
マイクロサービスバックエンドAPIのためのRESTとgRPC
マイクロサービスバックエンドAPIのためのRESTとgRPCマイクロサービスバックエンドAPIのためのRESTとgRPC
マイクロサービスバックエンドAPIのためのRESTとgRPCdisc99_
 
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)NTT DATA Technology & Innovation
 
OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話
OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話
OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話Daichi Koike
 
メルカリ・ソウゾウでは どうGoを活用しているのか?
メルカリ・ソウゾウでは どうGoを活用しているのか?メルカリ・ソウゾウでは どうGoを活用しているのか?
メルカリ・ソウゾウでは どうGoを活用しているのか?Takuya Ueda
 
MySQL Scalability and Reliability for Replicated Environment
MySQL Scalability and Reliability for Replicated EnvironmentMySQL Scalability and Reliability for Replicated Environment
MySQL Scalability and Reliability for Replicated EnvironmentJean-François Gagné
 
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres OpenBruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres OpenPostgresOpen
 
続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2
続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2
続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2Preferred Networks
 
Magnum IO GPUDirect Storage 最新情報
Magnum IO GPUDirect Storage 最新情報Magnum IO GPUDirect Storage 最新情報
Magnum IO GPUDirect Storage 最新情報NVIDIA Japan
 

What's hot (20)

PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜
PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜
PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜
 
Redmineとgitの 連携利用事例
Redmineとgitの 連携利用事例Redmineとgitの 連携利用事例
Redmineとgitの 連携利用事例
 
1075: .NETからCUDAを使うひとつの方法
1075: .NETからCUDAを使うひとつの方法1075: .NETからCUDAを使うひとつの方法
1075: .NETからCUDAを使うひとつの方法
 
Git超入門_座学編.pdf
Git超入門_座学編.pdfGit超入門_座学編.pdf
Git超入門_座学編.pdf
 
日本語テストメソッドについて
日本語テストメソッドについて日本語テストメソッドについて
日本語テストメソッドについて
 
私とOSSの25年
私とOSSの25年私とOSSの25年
私とOSSの25年
 
ドメイン駆動設計という設計スタイル
ドメイン駆動設計という設計スタイルドメイン駆動設計という設計スタイル
ドメイン駆動設計という設計スタイル
 
Redmine にいろいろ埋め込んでみた
Redmine にいろいろ埋め込んでみたRedmine にいろいろ埋め込んでみた
Redmine にいろいろ埋め込んでみた
 
Goの時刻に関するテスト
Goの時刻に関するテストGoの時刻に関するテスト
Goの時刻に関するテスト
 
Go入門
Go入門Go入門
Go入門
 
リーンなコードを書こう:実践的なオブジェクト指向設計
リーンなコードを書こう:実践的なオブジェクト指向設計リーンなコードを書こう:実践的なオブジェクト指向設計
リーンなコードを書こう:実践的なオブジェクト指向設計
 
SQL大量発行処理をいかにして高速化するか
SQL大量発行処理をいかにして高速化するかSQL大量発行処理をいかにして高速化するか
SQL大量発行処理をいかにして高速化するか
 
マイクロサービスバックエンドAPIのためのRESTとgRPC
マイクロサービスバックエンドAPIのためのRESTとgRPCマイクロサービスバックエンドAPIのためのRESTとgRPC
マイクロサービスバックエンドAPIのためのRESTとgRPC
 
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
Kubernetes環境に対する性能試験(Kubernetes Novice Tokyo #2 発表資料)
 
OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話
OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話
OpenAPI 3.0でmicroserviceのAPI定義を試みてハマった話
 
メルカリ・ソウゾウでは どうGoを活用しているのか?
メルカリ・ソウゾウでは どうGoを活用しているのか?メルカリ・ソウゾウでは どうGoを活用しているのか?
メルカリ・ソウゾウでは どうGoを活用しているのか?
 
MySQL Scalability and Reliability for Replicated Environment
MySQL Scalability and Reliability for Replicated EnvironmentMySQL Scalability and Reliability for Replicated Environment
MySQL Scalability and Reliability for Replicated Environment
 
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres OpenBruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
Bruce Momjian - Inside PostgreSQL Shared Memory @ Postgres Open
 
続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2
続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2
続・PFN のオンプレML基盤の取り組み / オンプレML基盤 on Kubernetes 〜PFN、ヤフー〜 #2
 
Magnum IO GPUDirect Storage 最新情報
Magnum IO GPUDirect Storage 最新情報Magnum IO GPUDirect Storage 最新情報
Magnum IO GPUDirect Storage 最新情報
 

Similar to Launch and Environment Constraints Overview

Lxc – next gen virtualization for cloud intro (cloudexpo)
Lxc – next gen virtualization for cloud   intro (cloudexpo)Lxc – next gen virtualization for cloud   intro (cloudexpo)
Lxc – next gen virtualization for cloud intro (cloudexpo)Boden Russell
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesDustin Kirkland
 
Scaleable PHP Applications in Kubernetes
Scaleable PHP Applications in KubernetesScaleable PHP Applications in Kubernetes
Scaleable PHP Applications in KubernetesRobert Lemke
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsSecurity Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsIgor Beliaiev
 
Security Considerations on Linux Package Management
Security Considerations on Linux Package ManagementSecurity Considerations on Linux Package Management
Security Considerations on Linux Package ManagementTharindu Edirisinghe
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questionsTeja Bheemanapally
 
Jump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & GithubJump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & Githubhubx
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016Phil Estes
 
20+ ways to bypass your mac os privacy mechanisms
20+ ways to bypass your mac os privacy mechanisms20+ ways to bypass your mac os privacy mechanisms
20+ ways to bypass your mac os privacy mechanismsCsaba Fitzl
 
Linux Troubleshooting
Linux TroubleshootingLinux Troubleshooting
Linux TroubleshootingKeith Wright
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationOlehLevytskyi1
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker皓鈞 張
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy MechanismsSecuRing
 
Unix Security
Unix SecurityUnix Security
Unix Securityreplay21
 

Similar to Launch and Environment Constraints Overview (20)

Linux clustering solution
Linux clustering solutionLinux clustering solution
Linux clustering solution
 
Wissbi osdc pdf
Wissbi osdc pdfWissbi osdc pdf
Wissbi osdc pdf
 
Lxc – next gen virtualization for cloud intro (cloudexpo)
Lxc – next gen virtualization for cloud   intro (cloudexpo)Lxc – next gen virtualization for cloud   intro (cloudexpo)
Lxc – next gen virtualization for cloud intro (cloudexpo)
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security Features
 
Scaleable PHP Applications in Kubernetes
Scaleable PHP Applications in KubernetesScaleable PHP Applications in Kubernetes
Scaleable PHP Applications in Kubernetes
 
visagie_freebsd
visagie_freebsdvisagie_freebsd
visagie_freebsd
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsSecurity Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
 
Security Considerations on Linux Package Management
Security Considerations on Linux Package ManagementSecurity Considerations on Linux Package Management
Security Considerations on Linux Package Management
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questions
 
Introduction to docker
Introduction to dockerIntroduction to docker
Introduction to docker
 
Jump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & GithubJump into Squeak - Integrate Squeak projects with Docker & Github
Jump into Squeak - Integrate Squeak projects with Docker & Github
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016
 
File000127
File000127File000127
File000127
 
20+ ways to bypass your mac os privacy mechanisms
20+ ways to bypass your mac os privacy mechanisms20+ ways to bypass your mac os privacy mechanisms
20+ ways to bypass your mac os privacy mechanisms
 
Linux Troubleshooting
Linux TroubleshootingLinux Troubleshooting
Linux Troubleshooting
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms
 
Unix Security
Unix SecurityUnix Security
Unix Security
 

More from Csaba Fitzl

macOS Vulnerabilities Hiding in Plain Sight
macOS Vulnerabilities Hiding in Plain SightmacOS Vulnerabilities Hiding in Plain Sight
macOS Vulnerabilities Hiding in Plain SightCsaba Fitzl
 
SecurityFest-22-Fitzl-beyond.pdf
SecurityFest-22-Fitzl-beyond.pdfSecurityFest-22-Fitzl-beyond.pdf
SecurityFest-22-Fitzl-beyond.pdfCsaba Fitzl
 
Mitigating Exploits Using Apple's Endpoint Security
Mitigating Exploits Using Apple's Endpoint SecurityMitigating Exploits Using Apple's Endpoint Security
Mitigating Exploits Using Apple's Endpoint SecurityCsaba Fitzl
 
Csaba fitzl - Mount(ain) of Bugs
Csaba fitzl - Mount(ain) of BugsCsaba fitzl - Mount(ain) of Bugs
Csaba fitzl - Mount(ain) of BugsCsaba Fitzl
 
Exploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOSExploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOSCsaba Fitzl
 
Exploiting XPC in AntiVirus
Exploiting XPC in AntiVirusExploiting XPC in AntiVirus
Exploiting XPC in AntiVirusCsaba Fitzl
 
GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?Csaba Fitzl
 
Getting root with benign app store apps vsecurityfest
Getting root with benign app store apps vsecurityfestGetting root with benign app store apps vsecurityfest
Getting root with benign app store apps vsecurityfestCsaba Fitzl
 
Getting root with benign app store apps
Getting root with benign app store appsGetting root with benign app store apps
Getting root with benign app store appsCsaba Fitzl
 
Exploit generation and javascript analysis automation with WinDBG lu
Exploit generation and javascript analysis automation with WinDBG luExploit generation and javascript analysis automation with WinDBG lu
Exploit generation and javascript analysis automation with WinDBG luCsaba Fitzl
 
Exploit generation automation with WinDBG (Hacktivity 2017)
Exploit generation automation with WinDBG (Hacktivity 2017)Exploit generation automation with WinDBG (Hacktivity 2017)
Exploit generation automation with WinDBG (Hacktivity 2017)Csaba Fitzl
 
How to convince a malware to avoid us
How to convince a malware to avoid usHow to convince a malware to avoid us
How to convince a malware to avoid usCsaba Fitzl
 

More from Csaba Fitzl (12)

macOS Vulnerabilities Hiding in Plain Sight
macOS Vulnerabilities Hiding in Plain SightmacOS Vulnerabilities Hiding in Plain Sight
macOS Vulnerabilities Hiding in Plain Sight
 
SecurityFest-22-Fitzl-beyond.pdf
SecurityFest-22-Fitzl-beyond.pdfSecurityFest-22-Fitzl-beyond.pdf
SecurityFest-22-Fitzl-beyond.pdf
 
Mitigating Exploits Using Apple's Endpoint Security
Mitigating Exploits Using Apple's Endpoint SecurityMitigating Exploits Using Apple's Endpoint Security
Mitigating Exploits Using Apple's Endpoint Security
 
Csaba fitzl - Mount(ain) of Bugs
Csaba fitzl - Mount(ain) of BugsCsaba fitzl - Mount(ain) of Bugs
Csaba fitzl - Mount(ain) of Bugs
 
Exploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOSExploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOS
 
Exploiting XPC in AntiVirus
Exploiting XPC in AntiVirusExploiting XPC in AntiVirus
Exploiting XPC in AntiVirus
 
GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?
 
Getting root with benign app store apps vsecurityfest
Getting root with benign app store apps vsecurityfestGetting root with benign app store apps vsecurityfest
Getting root with benign app store apps vsecurityfest
 
Getting root with benign app store apps
Getting root with benign app store appsGetting root with benign app store apps
Getting root with benign app store apps
 
Exploit generation and javascript analysis automation with WinDBG lu
Exploit generation and javascript analysis automation with WinDBG luExploit generation and javascript analysis automation with WinDBG lu
Exploit generation and javascript analysis automation with WinDBG lu
 
Exploit generation automation with WinDBG (Hacktivity 2017)
Exploit generation automation with WinDBG (Hacktivity 2017)Exploit generation automation with WinDBG (Hacktivity 2017)
Exploit generation automation with WinDBG (Hacktivity 2017)
 
How to convince a malware to avoid us
How to convince a malware to avoid usHow to convince a malware to avoid us
How to convince a malware to avoid us
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Launch and Environment Constraints Overview