{"id":2302,"date":"2026-05-04T23:18:36","date_gmt":"2026-05-05T02:18:36","guid":{"rendered":"https:\/\/securitybsides.com.br\/2026\/?page_id=2302"},"modified":"2026-05-05T08:28:10","modified_gmt":"2026-05-05T11:28:10","slug":"apple-red-team-village-artv","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2026\/apple-red-team-village-artv\/","title":{"rendered":"Apple Red Team Village (ARTV)"},"content":{"rendered":"\n<table id=\"tablepress-43\" class=\"tablepress tablepress-id-43 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Hor\u00e1rio<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:45<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Abertura<\/center><\/strong><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">TBD<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:45<\/strong><\/center><\/td><td class=\"column-2\">iOS Patch Diffing<\/td><td class=\"column-3\">Nesta palestra, Naves apresenta uma abordagem pr\u00e1tica sobre Patch Diffing em<br \/>\niOS, explorando como identificar e analisar corre\u00e7\u00f5es de seguran\u00e7a introduzidas em novas vers\u00f5es<br \/>\ndo sistema da Apple. Ser\u00e3o abordados os fundamentos da t\u00e9cnica, as ferramentas utilizadas para<br \/>\ncomparar bin\u00e1rios entre diferentes vers\u00f5es do iOS e como essas an\u00e1lises permitem identificar<br \/>\nmudan\u00e7as relevantes no c\u00f3digo incluindo vulnerabilidades corrigidas.<br \/>\nAl\u00e9m da base conceitual, a talk traz um estudo de caso real, baseado em uma vulnerabilidade<br \/>\ndescoberta recentemente.<\/td><td class=\"column-4\">Bruno Naves<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:25<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td rowspan=\"3\" class=\"column-2\">Workshop &#8211; Basic Pentest Mobile iOS: Entenda, n\u00e3o apenas rode Scripts<\/td><td rowspan=\"3\" class=\"column-3\">Introdu\u00e7\u00e3o de pentest mobile iOS com foco em entendimento real do<br \/>\nambiente e das t\u00e9cnicas, indo al\u00e9m do uso autom\u00e1tico de ferramentas. Ser\u00e3o abordados<br \/>\ntemas como: Arquitetura iOS, estrutura do IPA, Jailbreak, principais prote\u00e7\u00f5es (antijailbreak, anti-hook, Ofusca\u00e7\u00e3o e Criptografia, TLS pinning, mTLS), como analisar de forma<br \/>\ncr\u00edtica, e bypass na pr\u00e1tica.<\/td><td rowspan=\"3\" class=\"column-4\">Rodolfo Mariano &amp; Caio Robaldo<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:25<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:10<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>15:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:20<\/strong><\/center><\/td><td class=\"column-2\">O por que o RASP existe<\/td><td class=\"column-3\">Quais os ataques principais e perspectivas futuras de ataques e prote\u00e7\u00f5es de<br \/>\naplica\u00e7\u00f5es mobile!<\/td><td class=\"column-4\">Kelvin Clark<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:05<\/strong><\/center><\/td><td class=\"column-2\">Vamos fazer funcionar no Windows mac a gente v\u00ea depois<\/td><td class=\"column-3\">Onde o &#8220;deve funcionar&#8221; encontra o &#8220;por que n\u00e3o est\u00e1 funcionando?&#8221;<br \/>\nD\u00edvida T\u00e9cnica e o &#8220;Depois a gente v\u00ea&#8221;: Como a prioriza\u00e7\u00e3o hist\u00f3rica do Windows cria armadilhas<br \/>\nque se transformam em chamados cr\u00edticos \u00e0s 3 da manh\u00e3.<br \/>\nFantasmagoria T\u00e9cnica: O tri\u00e2ngulo das bermudas entre autentica\u00e7\u00e3o 802.1X, certificados que<br \/>\nmentem e pol\u00edticas de MDM que reportam sucesso enquanto nada muda no sistema.<br \/>\nO Enigma do Log: Porque o log stream do macOS parece uma esfinge e como decifrar o sil\u00eancio do<br \/>\nUnix quando ele se recusa a conversar com o Azure\/Intune.<br \/>\nGest\u00e3o Nativa vs. Gambiarra: O momento da epifania: parar de for\u00e7ar GPOs em um kernel Darwin e<br \/>\ncome\u00e7ar a gerir o Mac respeitando sua l\u00f3gica original.<br \/>\nO Que Esperar<br \/>\nUma sess\u00e3o baseada em incidentes reais e &#8220;cicatrizes&#8221; de suporte. Vamos trocar o suporte gen\u00e9rico<br \/>\npor solu\u00e7\u00f5es pr\u00e1ticas e uma dose necess\u00e1ria de catarse coletiva. \u00c9 o guia definitivo para escalar a<br \/>\nApple no Enterprise sem sacrificar sua sanidade mental.<\/td><td class=\"column-4\">Natalia Sampaio<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>17:50<\/strong><\/center><\/td><td class=\"column-2\">Encerramento ARTV (Brindes e An\u00fancios)<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-43 from cache -->","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-2302","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/comments?post=2302"}],"version-history":[{"count":2,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2302\/revisions"}],"predecessor-version":[{"id":2372,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2302\/revisions\/2372"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/media?parent=2302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}