March 31, 2023, 6:52 p.m. | Black Hat

Black Hat www.youtube.com

...During this talk, we will give you an overview of the TCC framework, its building blocks, and how it limits application access to private data. We will explore the various databases it uses and discuss the difference between user consent and user intent. Next, we will go through various techniques and specific vulnerabilities that we used to bypass TCC. It will cover techniques like regression vulnerabilities, code injections, logic bugs, built-in sysadmin tools abuse, and more. We will see how …

abuse access application bugs bypass code consent data databases discuss framework intent logic macos monterey privacy private private data sysadmin tcc techniques things tools vulnerabilities

Cryptography Software Developer

@ Intel | USA - AZ - Chandler

Lead Consultant, Geology

@ WSP | Richmond, VA, United States

BISO Cybersecurity Director

@ ABM Industries | Alpharetta, GA, United States

TTECH Analista de ciberseguridad

@ Telefónica | LIMA, PE

TRANSCOM IGC - Cloud Security Engineer

@ IT Partners, Inc | St. Louis, Missouri, United States

Sr Cyber Threat Hunt Researcher

@ Peraton | Beltsville, MD, United States