![]() ![]() Starts by explaining how statically triage a sample, for example via extracting embedded strings, code-signing information (and entitlements), and more. programming topics (ideally some coding experience)Ĭovers basic macOS malware and security concepts (such as common infection vectors & persistence). ![]() In order to get the most out of this training, attendees should have a basic understanding of the following: and yes, during the training you'll be able try out the analysis concepts, directly upon captured macOS malware! □ In this content-packed one-day course, Mac security expert Patrick Wardle will teach the tools and techniques needed to comprehensively analyze and understand malware targeting Apple's desktop OS. New to 2019: OSX.CookieMiner, OSX.Yort, and many more!Įver wanted to learn exactly how to tear apart these malicious creations in order to reveal their inner workings? Here's your chance! This plugin can be referenced from the command line tool using 8x300 as its identifer.ĬPU backends currently supported: 8x300, 8x305.As macOS grows in popularity, so does the prevalence of malware targeting this platform. This CPU core plugin allows you to disassemble 8x300 code, used in early signal processing equipment in the 70s and early 80s. This can be changed via the usual Hopper CPU mode setting facilities.
0 Comments
Leave a Reply. |