Abstract
This presentation will explore the unique challenges of securing macOS thick client applications, while drawing on valuable insights from the iOS penetration testing space.
Covering the methodologies and tools relevant to iOS and macOS platforms, focusing on the specific vulnerabilities that macOS applications might encounter. Attendees can expect to learn about:
• macOS secure coding best practices • Effective reverse engineering techniques • Automation tools specifically designed for the macOS environment
To support the above objectives, I’ll be sharing a macOS intentionally vulnerable thick client application. The aim is to equip beginners, seasoned pentesters and developers with practical insights that can boost their macOS Thick Client application testing skills.
This talk will provide useful takeaways for anyone looking to enhance their understanding of macOS application security.