A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 3 - Benefits of the Host PrivilegeThis part of the Black Hat presentation by representatives of the Team T5 Research is
dedicated to nuances of host privilege on Mac OS X and what can be done with it.
In particular, the ways of granting such permissions to a normal user are
highlighted. Additionally, the experts describe a method for bypassing the
kernel module verification and show the process of loading kernel module in a
demo.
Source:
A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 3 - Benefits of the Host Privilege