TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Understanding OS X Malware: “Methods of Malware Persistence on OS X”

3 点作者 CoffeePower将近 11 年前

1 comment

CoffeePower将近 11 年前
The linked KnockKnock script is interesting:<p>&quot;KnockKnock is command line python script that displays persistent OS X binaries that are set to execute automatically at each boot. Since KnockKnock takes an unbiased approach it can generically detect persist OS X malware, both today, and in the future. It should be noted though, this approach will also list legitimate binaries. However, as KnockKnock by default, will filter out unmodified Apple-signed binaries, the output is greatly reduced, leaving a handful of binaries that quickly can be examined and manually verified.&quot;<p><a href="https://github.com/synack/knockknock" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;synack&#x2F;knockknock</a>