Главная
Study mode:
on
1
Intro
2
What are we talking about?
3
How do we collect IR data?
4
PICT data collection
5
basic_info.txt
6
Persistence
7
Browser histories
8
Install history
9
Process info
10
Suspicious behavior
11
Wirenet walkthrough
12
Wirenet timeline
13
Mokes walkthrough
14
Mokes timeline
15
BirdMiner walkthrough
16
BirdMiner timeline
17
FruitFly walkthrough
18
FruitFly timeline
Description:
Explore incident response techniques for macOS in this 51-minute conference talk from Derbycon 2019. Delve into data collection methods, including PICT data collection and basic_info.txt. Learn about analyzing persistence mechanisms, browser histories, install history, and process information. Examine suspicious behavior through detailed walkthroughs and timelines of real-world malware examples such as Wirenet, Mokes, BirdMiner, and FruitFly. Gain valuable insights into detecting and responding to security incidents on Apple's operating system.

Incident Response on macOS - Thomas Reed

Add to list