Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Understanding OS X Malware: “Methods of Malware Persistence on OS X” (osxdaily.com)
3 points by CoffeePower on June 26, 2014 | hide | past | favorite | 1 comment


The linked KnockKnock script is interesting:

"KnockKnock is command line python script that displays persistent OS X binaries that are set to execute automatically at each boot. Since KnockKnock takes an unbiased approach it can generically detect persist OS X malware, both today, and in the future. It should be noted though, this approach will also list legitimate binaries. However, as KnockKnock by default, will filter out unmodified Apple-signed binaries, the output is greatly reduced, leaving a handful of binaries that quickly can be examined and manually verified."

https://github.com/synack/knockknock




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: