blog.xpnsec.com/dirtynib
Preview meta tags from the blog.xpnsec.com website.
Linked Hostnames
7- 7 links toblog.xpnsec.com
- 3 links togist.github.com
- 1 link todeveloper.apple.com
- 1 link togithub.com
- 1 link totwitter.com
- 1 link towww.linkedin.com
- 1 link tox.com
Thumbnail
Search Engine Appearance
MacOS "DirtyNIB" Vulnerability
While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.
Bing
MacOS "DirtyNIB" Vulnerability
While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.
DuckDuckGo
MacOS "DirtyNIB" Vulnerability
While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.
General Meta Tags
8- titleMacOS "DirtyNIB" Vulnerability - XPN InfoSec Blog
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1.0
- descriptionWhile looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.
Open Graph Meta Tags
3- og:titleMacOS "DirtyNIB" Vulnerability
- og:site_nameXPN InfoSec Blog
- og:imagehttps://assets.xpnsec.com/dirtynib/title.png
Twitter Meta Tags
6- twitter:site@_xpn_
- twitter:creator@_xpn_
- twitter:cardsummary_large_image
- twitter:title@_xpn_ - MacOS "DirtyNIB" Vulnerability
- twitter:imagehttps://assets.xpnsec.com/dirtynib/title.png
Link Tags
7- alternate/rss.xml
- icon/images/favicon.ico
- stylesheethttps://fonts.googleapis.com/css?family=Roboto:400,300,700|Noto+Serif:400,400italic,700,700italic
- stylesheethttps://fonts.googleapis.com/css?family=Open+Sans:300,400,700
- stylesheethttps://cdnjs.cloudflare.com/ajax/libs/prism/1.17.1/themes/prism.min.css
Emails
1- xpnsec[at]protonmail.com
Links
15- https://blog.xpnsec.com
- https://blog.xpnsec.com/about
- https://blog.xpnsec.com/dirtynib
- https://blog.xpnsec.com/rss
- https://blog.xpnsec.com/tags