More dates

    Adversary Tactics: Mac Tradecraft - October 2023 (Virtual; US Time)


    This event has passed Get Tickets

    Event description

    Red team operators enjoyed robust community and commercial tooling to simulate advanced adversary tradecraft in traditional enterprise environments. As organizations have increasingly moved to hybrid, or non-Windows, environments our red team community knowledge has not kept pace. This course focuses on bridging that gap, highlighting the latest macOS security enhancements, and arming red teamers with the foundational knowledge to operate against macOS endpoints. The objective is to deep dive into the concepts behind techniques to enable operational flexibility and prepare for future macOS enhancements, rather than simply training with specific available tooling.


    Course Summary

    While Windows is the main operating system in many enterprise environments, more companies are taking a hybrid approach to allow employees a choice of Mac or Windows, or forgoing Windows environments entirely. Regardless of the base operating system, the core tactics and tenant of adversary capability is the same - given enough time and resources, adversaries will find a way to achieve their objectives. Apple's approach to addressing the adversary problem is to force all non-Apple execution to user land and introduce new security enhancements for each version of macOS that bring the macOS and iOS operating systems closer together. When it comes to emulating tactics, techniques, and procedures (TTPs) on macOS, more time and emphasis must be placed on subverting Apple's custom controls such as Gatekeeper, Application Notarization, Entitlements, TCC, and the System Integrity Protection rather than bypassing EDR products.

    The Adversary Tactics: Mac Tradecraft course drops you into a modern macOS hybrid environment which mimics what SpecterOps operators encounter in real world red team exercises. Participants will focus on macOS payloads for initial access, crafting custom techniques on the fly via JXA and Objective C, identifying persistence and privilege escalation opportunities, stealing credentials, and avoiding common EDR detections via XPC services and native APIs. The course aims to teach participants about the consequences of their actions and the details behind their techniques rather than just how to run common tooling.


    Course Syllabus

    Day 1:

    • Course Overview
    • MacOS Introduction
    • Entitlements & TCC
    • Native Defenses
    • C2 & Mythic
    • Initial Access

    Day 2:

    • Initial Access (continued)
    • JXA
    • Situational Awareness
    • Active Directory
    • Kerberos

    Day 3:

    • Credential Access
    • Persistence
    • Privilege Escalation
    • Evasion
    • Defensive Overview


    Participant Requirements

    This course is not for beginners and includes a team-based, on-keyboard execution of complex red team tradecraft against macOS endpoints. Participants should be comfortable with penetration testing concepts and tools, Active Directory, and macOS internals.

    FAQs

    How can I contact the organizer with any questions?

    Please email training@specterops.io with any questions.  

    What's the refund policy?

    Full refunds will be provided up to 7 days before the course start date.

    What are the hardware requirements for attending the course?

    Courses are based in the SpecterOps training portal and accessible via an internet connection; no VMs are required for labs. The following are recommended hardware requirements:

    • Internet Connection
    • 8GBs of RAM
    • Modern Web Browser capable of rendering HTML5

    Powered by

    Tickets for good, not greed Humanitix dedicates 100% of profits from booking fees to charity