Skip to main content
Reverse Engineering Mac Malware 5 - Process and Network Analysis

Reverse Engineering Mac Malware 5 - Process and Network Analysis

Such important vectors of examining arbitrary code’s activity on Mac OS X as process analysis and network analysis are the subjects Sarah Edwards explicates here. In the context of the former, the expert dwells on instruments called Dtrace, including execsnoop and newproc.d; fs_usage; procxp; and the Activity Monitor. As far as network analysis is concerned, popular tools like CocoaPacketAnalyzer, Wireshark, Tcpdump and lsock get scrutinized and demonstrated via real-world examples.

John Dee
John Dee
3.0K
Reverse Engineering Mac Malware 4 - File Analysis

Reverse Engineering Mac Malware 4 - File Analysis

Forensic analyst Sarah Edwards now turns the focus of her presentation to the ins and outs of file analysis on Mac OS X. Within the framework of this nontrivial activity, really verbose tools such as Dtrace, fs_usage and fseventer are looked into, with some examples of the returned metadata and other attributes being provided along the way. Generally, this part is covering the methods for analyzing arbitrary Mac files and the types of information that can be retrieved as a result of this workflow.

John Dee
John Dee
3.4K
Reverse Engineering Mac Malware 3 - Dynamic Analysis

Reverse Engineering Mac Malware 3 - Dynamic Analysis

The topics covered by Sarah Edwards in this sub-section of her presentation are related to the various aspects of performing dynamic analysis of Mac applications, including malicious ones. In particular, the following processes are looked into: virtualization - that is, running code in a virtual machine; and application tracing, which is intended to return data on app execution, file system events, etc. Also, the tools applicable for dynamic analysis are listed here and demonstrated in action.

John Dee
John Dee
3.4K
Reverse Engineering Mac Malware 2 - Mach-O Binaries

Reverse Engineering Mac Malware 2 - Mach-O Binaries

The focus of this part of Sarah Edwards’ presentation is entirely on Mach-O binaries. In particular, the highlighted aspects include properties of these Mac OS X files, characteristics of universal/fat binaries, file signatures and code signed binaries. Furthermore, binary analysis using commands and such tools as MachOView and Hopper is graphically illustrated to give you a better idea of the capabilities and features provided by these apps.

John Dee
John Dee
4.5K
Reverse Engineering Mac Malware

Reverse Engineering Mac Malware

This is the first part of a series of posts reflecting the Security B Sides presentation done by Sarah Edwards, experienced digital forensic analyst. The subject matter includes an overview of tools and methods which are applicable to reverse engineer the infections tailored for Mac. In particular, the presentation covers file types and instruments in the context of static analysis as well as such components of dynamic analysis as virtualization and application tracing, with some illustrations being provided along the way.

John Dee
John Dee
4.6K
A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 4 - Integrity Checkup with System Virginity Verifier

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 4 - Integrity Checkup with System Virginity Verifier

The Team T5 guys, TT (Sung-ting Tsai) and Nanika (Ming-chieh Pan), end their Black Hat presentation with the description of a trick to gain root permission on Mac OS X. Also, the experts provide the main takeaways that should be drawn from their research and introduce the System Virginity Verifier for Mac OS X (SVV-X) tool intended for comprehensive Mac integrity checkup.

John Dee
John Dee
3.9K