TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Understanding OS X Malware: “Methods of Malware Persistence on OS X”

3 pointsby CoffeePoweralmost 11 years ago

1 comment

CoffeePoweralmost 11 years ago
The linked KnockKnock script is interesting:<p>&quot;KnockKnock is command line python script that displays persistent OS X binaries that are set to execute automatically at each boot. Since KnockKnock takes an unbiased approach it can generically detect persist OS X malware, both today, and in the future. It should be noted though, this approach will also list legitimate binaries. However, as KnockKnock by default, will filter out unmodified Apple-signed binaries, the output is greatly reduced, leaving a handful of binaries that quickly can be examined and manually verified.&quot;<p><a href="https://github.com/synack/knockknock" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;synack&#x2F;knockknock</a>