• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext

September 30, 2017 by Donald Hoxhaj Leave a Comment

https://thehackernews.com/2017/09/macos-high-sierra-keychain.html

Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext

This article talks about the following: Apple rolled out a new version of its macOS operation system and a few hours before a hack publicly disclosed the details of critical vulnerability that affects Sierra as well as all earlier versions of macOS, Patrick Wardle the hacker found a critical zero-day vulnerability in macOS that allows any installed application to steal usernames and plaintext password of online accounts stored in the macOS Keychain, macOS Keychain is a build-in password management system that allows users to securely store username and passwords for online application, servers, websites, and credit card information, there is a flaw where malicious non-privileged code in app could programmatically access the Keychain and dump all this data including your plain text passwords, finally Patrick Wardle has release a proof of concept video that demonstrated how the hack can be used to exhilarate every single plaintext password from Keychain.

If you interested on the video -> https://vimeo.com/235313957

Filed Under: Week 05: System and User Enumeration Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in