Главная
Study mode:
on
1
Intro
2
A Mac is infected! What do you do now?
3
Forensic collection
4
IR collection
5
Login itens
6
"Hidden" login items
7
Kernel extensions
8
Login hooks
9
Startup itens
10
Processes
11
Install history
12
Safari
13
Firefox
14
Quarantine
15
bash config
16
bash history
17
System config
18
Pre-Sierra logs
19
Unified logs
20
Python's os.walk and os.stat
21
Other tools
22
Questions?
Description:
Explore incident response techniques for macOS in this 52-minute conference talk from BSides Cleveland 2019. Learn about forensic and IR collection methods, investigating login items, kernel extensions, startup items, and processes. Discover how to analyze install history, browser data, quarantine information, bash configurations, and system logs. Gain insights into using Python's os.walk and os.stat for file system analysis, and explore additional tools for effective macOS incident response.

Incident Response on macOS

Add to list