Esf editor for mac

broken image

The objective of this lab will be to demonstrate the background behind the target control, how it benefits users and importantly how it can be bypassed. Now within this workshop we are going to take an alternative angle - what can an attacker do once on the device? This post exploitation workshop focusses on bypassing certain security and privacy controls that Apple has included within macOS. To this point we have analysed potential initial access techniques, how attackers may then persist on compromised devices, and how these attacks may be detected.Ī recording of this workshop series can be found here and the slides are available here.

broken image
broken image

As we enter the final Lab of F-Secure Consulting's Attack Detection Fundamental's macOS workshop we must reflect on what we have a covered so far.