Hacking Exposed: Hacking Macs

Dmitri Alperovitch, Co-Founder & CTO, CrowdStrike
George Kurtz, CEO, CrowdStrike

Real-world case studies of advanced intrusions on MacOS systems, with detailed breakdown of TTPs and artifacts. In the typical raw Hacking Exposed style, the session will demonstrate these attacks and provide relevant countermeasures for detection and response. Reprising their appearance again this year are also the must-see Adversary Oscars.Learning Objectives:1: Learn what the different attacker TTPs are on

Hacking Exposed: Hacking Macs
How to install:
– Download, extract and run .exe file,
(If your antivirus blocking file, pause it or disable it for some time.)
– Choose destination folder

How to Use:
Open destination folder and locate file notes.txt, open it and read step by step.

Don’t forget to read instructions after installation.
Enjoy Hacking Exposed: Hacking Macs.

All files are uploaded by users like you, we can’t guarantee that Hacking Exposed: Hacking Macs are up to date.
We are not responsible for any illegal actions you do with theses files. Download and use Hacking Exposed: Hacking Macs on your own responsibility.