Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

#HITB2023AMS

Автор: Hack In The Box Security Conference

Загружено: 2023-05-10

Просмотров: 2639

Описание:

This talk is an overview about recent iOS 0-1 Click Malware and focuses on the current technical capabilities that we have when it comes to detecting malware on iOS.

I will start again with the analysis of the four main samples of iOS Malware that are known to the public as of today (Pegasus I/II, Hermit, and the Google findings in 2019). We will cover how the researchers have made the detection and what we can learn from that for future analysis. Having looked at some malware samples it is time to look at our technical detection capabilities. These are split in three groups:

On device / Fully Automated

This is everything that can be done from a sandboxed app directly on the device. A typical example is jailbreak detection. I will shed some light on how current jailbreak detection works and how we can use that for detection of advanced malware.

Companion / MDM / Half Automated

In this category we will have a look at what data is available trough MDM access and how we can use that data to detect and event prevent from some kind of Malware.

Third: Forensic / Manual

This category is probably the most interesting one. As it is relying on data that is available trough Apple’s Backup / macOS Synchronisation capabilities it is not well documented but still provides access to many interesting things such as CrashLogs or Backup Data. Even though there are some companies available that allow forensic analysis and extraction like Cellebrite, Magnet, Elcomsoft etc, none of them focus on the detection of IOCs which might have left behind by malware. The first and also opensource tool that was made available is the MVT tool by Amnesty International. I’d like to show which data can be manually extracted from a device and how we can use that for the detection of malware. As this topic is not commonly covered in iOS security or forensics training I will also take more time to explain how to use the tools involved and some best practices on extracting the data.

After having talked about detection capabilities and the analysis of current samples of malware, we bring both topics together and show the constraints that we currently have:

What can we detect automatically?
What can we detect manually?
At which scale can we detect things manually?
What are signs of compromise?

At last I will once again share some ideas and concept of things that could be done to improve the detection of malware on iOS. This will be grouped around the following questions:

How can we increase the data that we can collect from iOS devices?
How can we improve the data collection process?
How can we implement detection at scale?

#HITB2023AMS

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

StructuredTaskScope And ScopedValue - Get The Most Out of Virtual Threads | Christian Woerz

StructuredTaskScope And ScopedValue - Get The Most Out of Virtual Threads | Christian Woerz

Walka o KRS w Polsce, Mercosur w TSUE, w Davos Trump I Nawrocki, Grenlandia i Długi USA.

Walka o KRS w Polsce, Mercosur w TSUE, w Davos Trump I Nawrocki, Grenlandia i Długi USA.

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

Этот форум по киберпреступности полон хакеров

Этот форум по киберпреступности полон хакеров

38C3: From Pegasus to Predator - The evolution of Commercial Spyware on iOS (Matthias Frielingsdorf)

38C3: From Pegasus to Predator - The evolution of Commercial Spyware on iOS (Matthias Frielingsdorf)

You Shall Not PASS - Analysing a NSO iOS Spyware Sample

You Shall Not PASS - Analysing a NSO iOS Spyware Sample

#HITB2023AMS D1T2 - XRP Raid Protector: Killing A Critical Bug Worth 40 Billion Dollars - Haoyu Yang

#HITB2023AMS D1T2 - XRP Raid Protector: Killing A Critical Bug Worth 40 Billion Dollars - Haoyu Yang

Разработка вредоносного ПО: процессы, потоки и дескрипторы

Разработка вредоносного ПО: процессы, потоки и дескрипторы

The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)

The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)

"Unmasking the Godfather - Reverse Engineering the Latest Android Banking Trojan" by Laurie Kirk

Apple's Predicament: NSPredicate Exploits on iOS and macOS

Apple's Predicament: NSPredicate Exploits on iOS and macOS

iOS Location and Media Forensics | iOS Forensics 5

iOS Location and Media Forensics | iOS Forensics 5

БЕЛЫЕ СПИСКИ: какой VPN-протокол справится? Сравниваю все

БЕЛЫЕ СПИСКИ: какой VPN-протокол справится? Сравниваю все

#HITB2023AMS KEYNOTE: The Myths Of Software Security - Mark Curphey

#HITB2023AMS KEYNOTE: The Myths Of Software Security - Mark Curphey

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Как пробить любого человека. 15 инструментов OSINT - Сможет каждый. Без

Как пробить любого человека. 15 инструментов OSINT - Сможет каждый. Без "Глаз Бога"

Redline InfoStealer Malware Analysis with Wireshark & ANY.RUN

Redline InfoStealer Malware Analysis with Wireshark & ANY.RUN

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

I analyzed my iPhone for the Pegasus spyware... - How-To Guide

I analyzed my iPhone for the Pegasus spyware... - How-To Guide

Malware Analysis with Any.Run | Malware Testing | Testing Viruses | Beginners

Malware Analysis with Any.Run | Malware Testing | Testing Viruses | Beginners

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com