Explore >> Select a destination


You are here

theevilbit.github.io
| | balintmagyar.com
3.0 parsecs away

Travel
| | Fixed in version 16.2.0.0128 - $11,250 bug bounty
| | her.esy.fun
2.7 parsecs away

Travel
| |
| | bradleyjkemp.dev
1.6 parsecs away

Travel
| | LaunchDaemon (or LaunchAgent) Hijacking is a MacOS privilege escalation and persistence technique. It involves abusing insecure file/folder permissions to replace legitimately installed, misconfigured LaunchDaemons with malicious code. I first spotted this issue affecting the OSQuery installer but went looking and found multiple other products with the same problem. This isn't a novel technique (it's briefly mentioned in T1543.004) but I was surprised to find it so rarely talked about. Example - Hijacking the OSQuery LaunchDaemon ?? I've already disclosed this issue to the OSQuery team and they kindly let me use it as an example in this post.
| | www.aymericlamboley.fr
7.4 parsecs away

Travel
| [AI summary] A blog post explains how to install an iOS app directly from a URL using a plist file and a QR code, bypassing the need for third-party services like TestFlight.