Explore >> Select a destination


You are here

theevilbit.github.io
| | blog.hobbyistsoftware.com
3.8 parsecs away

Travel
| | [AI summary] A developer shares a tutorial on how to access related Objective-C header files from an app's info.plist in the Mac sandbox using a custom FilePresenter and NSFileCoordinator.
| | pewpewthespells.com
4.8 parsecs away

Travel
| | [AI summary] This technical tutorial explains how to create and configure custom Base and Sparse SDK bundles for use with Xcode, detailing the SDKSettings.plist structure, search paths, and common bugs reported via Apple Radars.
| | bradleyjkemp.dev
4.3 parsecs away

Travel
| | LaunchDaemon (or LaunchAgent) Hijacking is a MacOS privilege escalation and persistence technique. It involves abusing insecure file/folder permissions to replace legitimately installed, misconfigured LaunchDaemons with malicious code. I first spotted this issue affecting the OSQuery installer but went looking and found multiple other products with the same problem. This isn't a novel technique (it's briefly mentioned in T1543.004) but I was surprised to find it so rarely talked about. Example - Hijacking the OSQuery LaunchDaemon ?? I've already disclosed this issue to the OSQuery team and they kindly let me use it as an example in this post.
| | tla.systems
11.1 parsecs away

Travel
| Update, 01:36am - this bug was just fixed in iTunes Connect, and PCalc has been submitted correctly. Thanks Apple! Original post: I'm currently trying to submit an update to PCalc for i...