Completed
Dialit Hijacking
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Writing Badass Malware for OS X
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Overview
- 3 Why Care
- 4 Mac Malware
- 5 XSL CMD
- 6 AI Worm
- 7 Why
- 8 Hacking Teams
- 9 Conclusions
- 10 Our Goal
- 11 Infection
- 12 Software Distribution
- 13 Persistence
- 14 Binary Infection
- 15 How Secure Is It
- 16 Removing The Signature Block
- 17 Dialit Hijacking
- 18 Persistence Example
- 19 Self Defense
- 20 Encryption
- 21 Custom Loader
- 22 InMemory File Loader
- 23 Hiding Die Libraries
- 24 Making Malware Harder To Delete
- 25 SelfMonitoring
- 26 Architecture
- 27 Shell Code
- 28 Inject
- 29 Runtime Injection
- 30 Load Time Injection
- 31 Gatekeeper
- 32 How Gatekeeper Works
- 33 How Gatekeeper Doesnt Work
- 34 How Gatekeeper Works Again
- 35 Popups
- 36 XProtect
- 37 Hash
- 38 Sandbox
- 39 Kernel Code Signing
- 40 Loading Unsigned Extensions
- 41 Root Pipe
- 42 Root
- 43 Static signatures
- 44 Little Snitch
- 45 GBGKeychain
- 46 iCloud Bypass
- 47 Proof of Concept
- 48 Testing
- 49 Security
- 50 KnockKnock
- 51 Virus Total Integration
- 52 BlockBlock
- 53 Task Explorer
- 54 El Capitan
- 55 Demo
- 56 Conclusion
- 57 QA