You are here |
blog.securityinnovation.com | ||
| | | |
raelize.com
|
|
| | | | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training. | |
| | | |
sergioprado.blog
|
|
| | | | This article is going to be an introduction to embedded Linux security. | |
| | | |
blog.includesecurity.com
|
|
| | | | One of the first major goals when reversing a new piece of hardware is getting a copy of the firmware. Once you have access to the firmware, you can reverse engineer it by disassembling the machine code. Sometimes you can get access to the firmware without touching the hardware, by downloading a firmware update file ... Read more | |
| | | |
theevilbit.github.io
|
|
| | TL;DR Link to heading On macOS Mojave Gatekeeper only verifies executables, which are run with the open command or the user double clicks. It won't verify files, that are executed through other means like, directly executing a binary ./myapp regardless of the quarantine attribute. If you can place a plist file inside LaunchAgents/LaunchDaemons, the command inside will also be executed. Prior to Catalina there is a way to trick users to drag & drop files in the LaunchAgents folder. On macOS Catalina lot has changed, the most notable one regarding gatekeeper is that it will verify files when executed via classic 'exec' methods. |