Themes of interest are π-security topics, such as:
βοΈ OS internals
π¦ Malware analysis
π οΈ Tool making & breaking
π Bug discovery & exploitation
To improve the conf, we're charging a small corporate attendance fee.
Allows us to:
β«οΈhire pros to record talks
β«οΈpay speaker honorariums
β«οΈand much more!
Don't work at (a for profit) company? or company unable to pay for you to attend? Then attendance fee fully waived π
βοΈπ΄ + π· Though Hawaii has already hit an 80%+ (partial) vaccination rate for 12yrs+, for the safely of all, we're implementing the following at the conference:
π· Masks
π· Proof of vaccination
π· Attendance capped at ~100 (+speakers)
And how's our new hand-drawn artwork!? ...which will be available at the conference on t-shirts & swag! π₯π₯π₯
Just posted the #OBTS v4.0 schedule - have a peek! π
It's stacked full of epic talks on iOS/macOS internals, bugs, exploits, malware & more ...presented by many of the world's top researchers! π₯π₯π₯
The majority of Mac infections are "user-assisted", which Apple combats via:
β Notarization
β Gatekeeper
β File Quarantine
...these have proven problematic for attackers
But oops, this bug sidesteps all, allowing unsigned (unnotarized) items to be launched ...with no alerts!π
Q: Can our free open-source tools protect you ...with no a priori knowledge of this insidious threat?
When the malicious script in the infected Xcode project is executed and attempts to connect to the attacker's remote C&C server for tasking (via /bin/bash), LuLu will intercept this, and alert you:
If we allow the malicious payload (EggShell), to be downloaded from the server ....when it attempts to persistently install itself as a Launch Agent, BlockBlock will alert you: