Главная
Study mode:
on
1
Introduction
2
Overview
3
Why Care
4
Mac Malware
5
XSL CMD
6
AI Worm
7
Why
8
Hacking Teams
9
Conclusions
10
Our Goal
11
Infection
12
Software Distribution
13
Persistence
14
Binary Infection
15
How Secure Is It
16
Removing The Signature Block
17
Dialit Hijacking
18
Persistence Example
19
Self Defense
20
Encryption
21
Custom Loader
22
InMemory File Loader
23
Hiding Die Libraries
24
Making Malware Harder To Delete
25
SelfMonitoring
26
Architecture
27
Shell Code
28
Inject
29
Runtime Injection
30
Load Time Injection
31
Gatekeeper
32
How Gatekeeper Works
33
How Gatekeeper Doesnt Work
34
How Gatekeeper Works Again
35
Popups
36
XProtect
37
Hash
38
Sandbox
39
Kernel Code Signing
40
Loading Unsigned Extensions
41
Root Pipe
42
Root
43
Static signatures
44
Little Snitch
45
GBGKeychain
46
iCloud Bypass
47
Proof of Concept
48
Testing
49
Security
50
KnockKnock
51
Virus Total Integration
52
BlockBlock
53
Task Explorer
54
El Capitan
55
Demo
56
Conclusion
57
QA
Description:
Explore advanced techniques for creating sophisticated OS X malware and learn how to better secure your Mac in this 52-minute Black Hat conference talk. Delve into novel persistence methods, abuse of native OS X components to hinder analysis, and ways to bypass OS X's built-in malware mitigations and third-party security tools. Discover how to remotely bypass Gatekeeper, circumvent Apple's 'rootpipe' patch, and generically bypass popular antivirus and personal firewall products. Gain insights into infection methods, software distribution, binary infection, and self-defense mechanisms employed by malware. Learn about runtime injection, load-time injection, and techniques to exploit vulnerabilities in OS X security features. Conclude with an introduction to free security tools that can detect and prevent advanced OS X threats, empowering you to enhance your Mac's protection against current and future malware.

Writing Badass Malware for OS X

Black Hat
Add to list