ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

Автор: DEFCONConference

Загружено: 2019-08-20

Просмотров: 41752

Описание: Whenever a new Mac malware specimen is uncovered, it provides a unique insight into the offensive Mac capabilities of hackers or nation-state adversaries. Better yet, such discoveries provide fully-functional capabilities that may be weaponized for our own surreptitious purposes! I mean, life is short, why write your own?

We'll begin this talk by discussing the methodology of subverting existing malware for "personal use", highlighting both the challenges and benefits of such an approach.

Next, we'll walk-thru the weaponization of various Mac malware specimens, including an interactive backdoor, a file-exfiltration implant, ransomware, and yes, even adware. Customizations include various runtime binary modifications that will coerce such malware to accept tasking from our own C&C servers, and/or automatically perform actions on our behalf.

Of course, in their pristine state, such samples are currently detected by AV products. As such we'll also walk-thru subtle modifications that will ensure our modified tools remains undetected by traditional detection approaches.

In conclusion, we'll highlight novel heuristic methods that can generically detect such threats to ensure Mac users remain protected even from such weaponized threats.

Patrick Wardle
Patrick Wardle is the Chief Research Officer at Digita Security and founder of Objective-See. Having worked at NASA and the NSA, as well as presented at countless security conferences, he is intimately familiar with aliens, spies, and talking nerdy. Patrick is passionate about all things related to macOS security and thus spends his days finding Apple 0days, analyzing macOS malware and writing free open-source security tools to protect Mac users.

http://twitch.com/patrickwardle

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 31 - Demystifying (& Bypassing) macOS's Background Task Management - Patrick Wardle

DEF CON 31 - Demystifying (& Bypassing) macOS's Background Task Management - Patrick Wardle

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference

Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference

«15 репозиториев GitHub», запрещенных ФБР (вам обязательно нужно это увидеть!!)

«15 репозиториев GitHub», запрещенных ФБР (вам обязательно нужно это увидеть!!)

DEF CON 27: El Kentaro's Deauth Detector - Hak5 2601

DEF CON 27: El Kentaro's Deauth Detector - Hak5 2601

DEF CON 26  - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86

DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86

Mike Spicer - I Know What U Did Last Summer 3 Yrs Wireless Monitoring DEFCON - DEF CON 27 Conference

Mike Spicer - I Know What U Did Last Summer 3 Yrs Wireless Monitoring DEFCON - DEF CON 27 Conference

#HITB2024BKK #COMMSEC D2: BadUSB Attacks on MacOS: Beyond Using the Terminal and Shell Commands

#HITB2024BKK #COMMSEC D2: BadUSB Attacks on MacOS: Beyond Using the Terminal and Shell Commands

Как  Хакеры Общаются в Терминале (БЕЗОПАСНО) без месенджеров | KALI LINUX CRYPTCAT

Как Хакеры Общаются в Терминале (БЕЗОПАСНО) без месенджеров | KALI LINUX CRYPTCAT

Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 Conference

Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 Conference

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 Conference

Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 Conference

DEF CON 27: The WiFi Kraken with D4rkm4tter - Hak5 2602

DEF CON 27: The WiFi Kraken with D4rkm4tter - Hak5 2602

Как на самом деле работают адвокаты в России | Суд и уголовные дела изнутри

Как на самом деле работают адвокаты в России | Суд и уголовные дела изнутри

Как хакеры взламывают Google 2FA

Как хакеры взламывают Google 2FA

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

The Most Promising 3D Printer That Nobody Uses Anymore

The Most Promising 3D Printer That Nobody Uses Anymore

How The Fridge Destroyed One of the World’s Largest Monopolies

How The Fridge Destroyed One of the World’s Largest Monopolies

Почему работает теория шести рукопожатий? [Veritasium]

Почему работает теория шести рукопожатий? [Veritasium]

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]