Abstract

In this talk, I will be diving through some of the well known concepts of finding misconfigurations against the Electron applications specific to macOS. The talk would have a hand pick on examples of what checks need to be perform while pen-testing such apps, which I also found during my bug hunting. We would also talk about mitigation factor for such vulnerabilities and would end this talk by demonstrating a TCC bypass

Speaker

Dhiraj Mishra

(!=1337)

Timing

Starts at Saturday February 17 2024, 04:15 PM. The sessions runs for 30 minutes.

Resources