Your Mac Defenestrated. Post OSXploitation Elevated.

Knock knock, it’s fear. Splunk’s blowing up and Blue Team’s at your rear. Prompting for authentication triggered user speculation. Now your simulation of hackers from a nation doesn’t meet your exceptions. Better privilege escalations would avoid this situation. Let go of your frustrations, and remember persistence takes patience. ttendees can expect to walk away with novel techniques leveraged by modern Red Teams to stealthily maintain persistence, elevate privileges, and perpetuate lateral movement within modern enterprises largely comprised of macOS endpoints.

Register Today!