MacBooster 5 review
This review provides a lowdown on MacBooster 5 application, highlighting its features in detail and evaluating the efficiency of Mac maintenance it delivers.
Reverse Engineering Mac Malware 5 - Process and Network Analysis
Sarah Edwards now makes an emphasis on such fundamentals of scrutinizing Mac malware as process analysis and network analysis, with tools and examples included.
Reverse Engineering Mac Malware 4 - File Analysis
Methods and tools for Mac file analysis, including Dtrace, fs_usage and fseventer, are extensively analyzed by Sarah Edwards in this part of the presentation.
Reverse Engineering Mac Malware 3 - Dynamic Analysis
The issues described and analyzed in this part are all about dynamic analysis of Mac apps, including virtualization, application tracing and applicable tools.
Reverse Engineering Mac Malware 2 - Mach-O Binaries
Sarah Edwards provides an extensive review of Mach-O binaries, including the types thereof, file signatures, and tools applicable to reverse engineer them.
Reverse Engineering Mac Malware
Digital forensic analyst Sarah Edwards presents an extensive review of tools and approaches applicable for reverse engineering Mac malware at B Sides event.
A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 4 - Integrity Checkup with System Virginity Verifier
At the end of their talk, TT and Nanika outline a method to gain root permission on Mac OS X and present their tool called System Virginity Verifier (SVV-X).
A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 3 - Benefits of the Host Privilege
Moving on with their presentation, the Team T5 experts delve into host privilege on Mac OS X in terms of the scope of permissions that a normal user can get.
A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 2 - Detecting a Process Hidden by Rubilyn
Expert from Taiwan by the handle TT continues the presentation by elaborating on the cat and mouse game of hiding and detecting a random process on Mac OS X.
You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet
Sung-ting Tsai and Ming-chieh Pan, researchers from Taiwan-based Team T5, take the floor at Black Hat Asia to demonstrate how tricky a Mac OS X rootkit can be.