{"id":978,"date":"2009-07-20T10:06:49","date_gmt":"2009-07-20T09:06:49","guid":{"rendered":"http:\/\/blog.intego.com\/?p=978"},"modified":"2009-07-20T10:06:49","modified_gmt":"2009-07-20T09:06:49","slug":"security-researcher-to-present-new-mac-hacks-at-black-hat-conference","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/","title":{"rendered":"Security Researcher to Present New Mac Hacks at Black Hat Conference"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg\"><\/p>\n<p>The forthcoming <a href=\"http:\/\/www.blackhat.com\/html\/bh-usa-09\/bh-usa-09-speakers.html\">Black Hat security conference<\/a>, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security researcher Dino Dai Zovi.<\/p>\n<p>First, he will discuss &#8220;Advanced Mac OS X Rootkits&#8221;:<\/p>\n<blockquote><p>This presentation will cover a variety of rootkit techniques for both user-space and kernel-space rootkits using unique and poorly understood or documented Mac OS X and Mach features.<\/p><\/blockquote>\n<p>And he will then give a talk about using the Metasploit hacking tool with Mac OS X:<\/p>\n<blockquote><p>While Metasploit has had a number of Mac exploits for several years, the exploit payloads available have done little more than give a remote shell. These payloads are significantly simpler than the DLL-injection based payloads for Windows-based targets like the Meterpreter and VNC Inject payloads. This talk will cover the development and use of the fancier Metasploit Mac payloads developed by Dino Dai Zovi (the presenter) and Charlie Miller, including bundle injection, iSight photo capture, and Macterpreter.<\/p><\/blockquote>\n<p>We&#8217;ll be looking forward to hearing more about these presentations, and we&#8217;ll post about them if any new and novel information is made public.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security researcher Dino Dai Zovi. First, he will discuss &#8220;Advanced Mac OS X Rootkits&#8221;: This presentation will cover a variety of rootkit techniques for both user-space and kernel-space rootkits using unique and poorly understood [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Researcher to Present New Mac Hacks at Black Hat Conference  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-20T09:06:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/\",\"name\":\"Security Researcher to Present New Mac Hacks at Black Hat Conference - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#primaryimage\"},\"datePublished\":\"2009-07-20T09:06:49+00:00\",\"dateModified\":\"2009-07-20T09:06:49+00:00\",\"description\":\"The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Researcher to Present New Mac Hacks at Black Hat Conference\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Security Researcher to Present New Mac Hacks at Black Hat Conference\",\"datePublished\":\"2009-07-20T09:06:49+00:00\",\"dateModified\":\"2009-07-20T09:06:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#webpage\"},\"wordCount\":192,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg\",\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/","og_locale":"en_US","og_type":"article","og_title":"Security Researcher to Present New Mac Hacks at Black Hat Conference  - The Mac Security Blog","og_description":"The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security","og_url":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-07-20T09:06:49+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/","name":"Security Researcher to Present New Mac Hacks at Black Hat Conference - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#primaryimage"},"datePublished":"2009-07-20T09:06:49+00:00","dateModified":"2009-07-20T09:06:49+00:00","description":"The forthcoming Black Hat security conference, to be held from July 25-30 in Las Vegas, features two interesting presentations from Mac security","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Security Researcher to Present New Mac Hacks at Black Hat Conference"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Security Researcher to Present New Mac Hacks at Black Hat Conference","datePublished":"2009-07-20T09:06:49+00:00","dateModified":"2009-07-20T09:06:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#webpage"},"wordCount":192,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-researcher-to-present-new-mac-hacks-at-black-hat-conference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/blackhat.jpg","articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/978"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=978"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/978\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}