Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability

Little Snitch was among the first software packages I tried to reverse and crack when I started using Macs. In the past I reported some weaknesses related to their licensing scheme but I never audited their kernel code since I am not a fan of IOKit rev…

Little Snitch was among the first software packages I tried to reverse and crack when I started using Macs. In the past I reported some weaknesses related to their licensing scheme but I never audited their kernel code since I am not a fan of IOKit reversing. The upcoming DEF CON presentation on Little Snitch re-sparked my curiosity last week and it was finally time to give the firewall a closer look.


Print Share Comment Cite Upload Translate
APA
() » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability. Retrieved from https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/.
MLA
" » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability." - , https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
HARVARD
» Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability., viewed ,
VANCOUVER
- » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
CHICAGO
" » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability." - Accessed . https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
IEEE
" » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability." [Online]. Available: https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/. [Accessed: ]
Select a language: