Sale!

EXP-312: Advanced macOS Control Bypasses

Original price was: $40.00.Current price is: $9.00.

Sale Price: $10
Regular Price: $45
Size: 0.91 GB
Duration: 8.03 hours
Number of Video Lessons: 139

BRAND:

Language: English
Availability: Instant Download
Rating: 4.9

Description

EXP-312: Advanced macOS Control Bypasses

OSMR Certification

Advanced macOS Control Bypasses (EXP-312) is our first macOS security course. It’s an offensive logical exploit development course for macOS, focusing on local privilege escalation and bypassing the operating system’s defenses. EXP-312 is an advanced course that teaches the skills necessary to bypass security controls implemented by macOS, and exploit logic vulnerabilities to perform privilege escalation on macOS systems. Learners who complete the course and pass the exam earn the OffSec macOS Researcher (OSMR) certification.

Course Info

Benefits

  • Obtain a strong understanding of macOS Internals
  • Learn how to bypass security controls implemented by macOS
  • Exploit logic vulnerabilities to perform privilege escalation on macOS systems

About the exam

    • The EXP-312 course and online lab prepares you for
    • the OSMR certification
    • 48-hour exam
    • Proctored

Who is this course for?

  • Anyone who is interested in learning about macOS exploitation
  • Pentesters looking to broaden their skill set to include macOS expertise
  • Anyone committed to the defense or security of macOS systems
  • Job roles like Penetration testers, Exploit developers, Security researcher, macOS defenders, and macOS application developers

Prerequisites

All learners are required to have:

  • C programming knowledge
  • Normal user experience with macOS
  • Basic familiarity with 64-bit assembly and debugging
  • Understanding of basic exploitation concepts

More details

Syllabus

This course covers the following topics, 

  • Introduction to macOS internals
  • Debugging, Tracing   Hopper
  • Shellcoding in macOS
  • Dylib Injection
  • Mach and Mach injection
  • Hooking
  • XPC exploitation
  • Sandbox escape
  • Attacking privacy (TCC)
  • Symlink attacks
  • Kernel code execution
  • macOS Pentesting

Discover more from Easy Learning (Since 2013)

Subscribe to get the latest posts sent to your email.

You may also like…