OWASP Chapters All Day starts on June 6-7 - 12:00 noon (UTC) Saturday - 12:00 noon (UTC) Sunday. Leaders from OWASP Chapters throughout the world invite you to join them for 24 hours of non-stop AppSec! We’ll kick off the festivities with Welcoming Remarks and a Keynote presentation at 12:00 noon (UTC) on Saturday, 6 June. Then, each hour, the (virtual) floor will be handed over to a leader from another OWASP Chapter, who will introduce speakers from their chapter/region. At 12:00 noon (UTC) on Sunday, 7 June, we’ll wrap things up with a brief recap and closing remarks. The entire event will be live-streamed on the OWASP Chapters All Day YouTube Channel. Organizing Committee: Oscar Bravo Lara (United Kingdom) Oscar Carlo Orellana Artigas (Chile) John DiLeo - Chapter Leader (New Zealand) Takaharu Ogasa - Chapter Leader (Sendai, Japan) Grant Ongers - Global Board of Directors (United Kingdom) Vandana Verma Sehgal - Global Board of Directors (India) Our very own Tony UcedaVélez (Chapter President) and Guled Abdilahi are representing ATLANTA!!! YAY!!! They will be speaking from 3pm - 4pm EST. Please click on the link for the website and the schedule for other chapters: https://owasp.org/www-community/social/chapters_all_day/
Syscalls are an integral part of many operating systems and acts as pivotal points between user-mode and kernel-mode communication. Given that vast available source code for XNU is available, it is possible to perform some very deep research into Syscall behavior and functionality. In this talk several aspects of Syscall behavior in relation to the XNU kernel including: • What are Syscalls • What purpose do Syscalls serve • How to enumerate XNU Syscalls • Identify Syscall specific functionality (i.e sysctl_in & sysctl_out) • How to perform automated and guided Syscall usage within a program utilizing DTRACE probes Robert Hawes is the VS-Labs Research Team leader at VerSprite LLC, operating as both a generalist and aspiring MacOS/iOS specialist. Robert’s day to day work involves building exploits targeting multiple different targets spanning Windows, MacOS, iOS, Android, and Linux to name a few. When not working on vulnerability research and or exploit development, you can usually find him idling on IRC while furthering his knowledge into MacOS/iOS.