Writing Badass Malware for OS X

Writing Badass Malware for OS X

Black Hat via YouTube Direct link

Introduction

1 of 57

1 of 57

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Writing Badass Malware for OS X

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 Why Care
  4. 4 Mac Malware
  5. 5 XSL CMD
  6. 6 AI Worm
  7. 7 Why
  8. 8 Hacking Teams
  9. 9 Conclusions
  10. 10 Our Goal
  11. 11 Infection
  12. 12 Software Distribution
  13. 13 Persistence
  14. 14 Binary Infection
  15. 15 How Secure Is It
  16. 16 Removing The Signature Block
  17. 17 Dialit Hijacking
  18. 18 Persistence Example
  19. 19 Self Defense
  20. 20 Encryption
  21. 21 Custom Loader
  22. 22 InMemory File Loader
  23. 23 Hiding Die Libraries
  24. 24 Making Malware Harder To Delete
  25. 25 SelfMonitoring
  26. 26 Architecture
  27. 27 Shell Code
  28. 28 Inject
  29. 29 Runtime Injection
  30. 30 Load Time Injection
  31. 31 Gatekeeper
  32. 32 How Gatekeeper Works
  33. 33 How Gatekeeper Doesnt Work
  34. 34 How Gatekeeper Works Again
  35. 35 Popups
  36. 36 XProtect
  37. 37 Hash
  38. 38 Sandbox
  39. 39 Kernel Code Signing
  40. 40 Loading Unsigned Extensions
  41. 41 Root Pipe
  42. 42 Root
  43. 43 Static signatures
  44. 44 Little Snitch
  45. 45 GBGKeychain
  46. 46 iCloud Bypass
  47. 47 Proof of Concept
  48. 48 Testing
  49. 49 Security
  50. 50 KnockKnock
  51. 51 Virus Total Integration
  52. 52 BlockBlock
  53. 53 Task Explorer
  54. 54 El Capitan
  55. 55 Demo
  56. 56 Conclusion
  57. 57 QA

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.