|
You are here |
blog.quarkslab.com | ||
| | | | |
objective-see.org
|
|
| | | | | [AI summary] The blog post discusses the analysis of OSX.DazzleSpy, a sophisticated cyber-espionage malware targeting macOS, including its persistence mechanisms, command-and-control communications, and capabilities such as remote desktop access and keychain dumping. | |
| | | | |
gist.github.com
|
|
| | | | | Docker For Mac Host Address Alias To Enable PHP XDebug (10.254.254.254 Trick) - README.md | |
| | | | |
bradleyjkemp.dev
|
|
| | | | | LaunchDaemon (or LaunchAgent) Hijacking is a MacOS privilege escalation and persistence technique. It involves abusing insecure file/folder permissions to replace legitimately installed, misconfigured LaunchDaemons with malicious code. I first spotted this issue affecting the OSQuery installer but went looking and found multiple other products with the same problem. This isn't a novel technique (it's briefly mentioned in T1543.004) but I was surprised to find it so rarely talked about. Example - Hijacking the OSQuery LaunchDaemon ?? I've already disclosed this issue to the OSQuery team and they kindly let me use it as an example in this post. | |
| | | | |
sarunw.com
|
|
| | | Learn how to use UIView as a SwiftUI view. | ||