Roberto Soares aka Espreto
If you use macOS in your daily life and rely on apps like Slack, Discord, GitHub, or VSCode—among dozens of others—chances are you're using an Electron app that might be vulnerable.Electron applications on macOS are often underestimated, yet they harbor vulnerabilities that can be exploited to significant effect. At the NullByte Conference, we’ll navigate through these risks, offering Red Teamers a unique insight into how these applications can be turned into potent attack vectors.In this session, we’ll explore how Electron apps can be exploited to bypass macOS's Transparency, Consent, and Control (TCC) framework, manipulate app entitlements for unauthorized access to cameras and microphones, and bypass the 'Privacy & Security' mechanisms to implant backdoors, escalate privileges, write in unauthorized locations, and maintain persistence. We'll delve into real-world cases, demonstrating these vulnerabilities in action and discussing how to prevent such attacks.