The following is a guest post by noar (@noarfromspace), a long time friend.
It shows some simple attacks against BlockBlock, a software developed by Patrick Wardle that monitors OS X common persistence locations for potential malware. The other day noar was telling me about a few bypasses he had found so I invited him to write a guest post.
The title is obviously playing with one of Patrick’s presentations. I met Patrick at Shakacon last year and this is not an attempt to shame him (that is reserved mostly for Apple ;-)).
Writing Bad @$$ Lamware for OS X
The following is a guest post by noar (@noarfromspace), a long time friend.
It shows some simple attacks against BlockBlock, a software developed by Patrick Wardle that monitors OS X common persistence locations for potential malware. The other day noa…
Print
Share
Comment
Cite
Upload
Translate
APA
() » Writing Bad @$$ Lamware for OS X. Retrieved from https://www.truth.cx/2015/08/07/writing-bad-lamware-for-os-x/.
MLA" » Writing Bad @$$ Lamware for OS X." - , https://www.truth.cx/2015/08/07/writing-bad-lamware-for-os-x/
HARVARD » Writing Bad @$$ Lamware for OS X., viewed ,
VANCOUVER - » Writing Bad @$$ Lamware for OS X. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2015/08/07/writing-bad-lamware-for-os-x/
CHICAGO" » Writing Bad @$$ Lamware for OS X." - Accessed . https://www.truth.cx/2015/08/07/writing-bad-lamware-for-os-x/
IEEE" » Writing Bad @$$ Lamware for OS X." [Online]. Available: https://www.truth.cx/2015/08/07/writing-bad-lamware-for-os-x/. [Accessed: ]