Little Snitch was among the first software packages I tried to reverse and crack when I started using Macs. In the past I reported some weaknesses related to their licensing scheme but I never audited their kernel code since I am not a fan of IOKit reversing. The upcoming DEF CON presentation on Little Snitch re-sparked my curiosity last week and it was finally time to give the firewall a closer look.
Print
Share
Comment
Cite
Upload
Translate
APA
() » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability. Retrieved from https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/.
MLA" » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability." - , https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
HARVARD » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability., viewed ,
VANCOUVER - » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
CHICAGO" » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability." - Accessed . https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
IEEE" » Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability." [Online]. Available: https://www.truth.cx/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/. [Accessed: ]