Muutke küpsiste eelistusi

Art of Mac Malware, Volume 2: Detecting Malicious Software [Pehme köide]

  • Formaat: Paperback / softback, 376 pages, kõrgus x laius: 236x177 mm, kaal: 369 g
  • Ilmumisaeg: 25-Feb-2025
  • Kirjastus: No Starch Press,US
  • ISBN-10: 1718503784
  • ISBN-13: 9781718503786
Teised raamatud teemal:
  • Formaat: Paperback / softback, 376 pages, kõrgus x laius: 236x177 mm, kaal: 369 g
  • Ilmumisaeg: 25-Feb-2025
  • Kirjastus: No Starch Press,US
  • ISBN-10: 1718503784
  • ISBN-13: 9781718503786
Teised raamatud teemal:
This detailed guide focuses on identifying and countering advanced malware threats on macOS, exploring programming techniques, security tools, real-world evasion strategies, Apple frameworks, and heuristic security methods, making it essential for security practitioners and those interested in macOS vulnerabilities. Original.

"Covers programming techniques that can be used to automatically detect malicious code running on a macOS system and the strategies used by actual malware specimens to evade detection. Reviews the operating system's internals and teaches how to develop real-time monitoring software"--

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these constantly evolving and increasingly sophisticated threats is through learning and applying robust heuristic-based detection techniques. 

To that end, Wardle draws upon decades of experience to guide you through the programmatic implementation of such detection techniques. By exploring how to leverage macOS’s security-centric frameworks (both public and private), diving into key elements of behavioral-based detection, and highlighting relevant examples of real-life malware, Wardle teaches and underscores the efficacy of these powerful approaches.

Across 14 in-depth chapters, you’ll learn how to:

  • Capture critical snapshots of system state to reveal the subtle signs of infection
  • Enumerate and analyze running processes to uncover evidence of malware
  • Parse the macOS’s distribution and binary file formats to detect malicious anomalies
  • Utilize code signing as an effective tool to identify malware and reduce false positives
  • Write efficient code that harnesses the full potential of Apple’s public and private APIs
  • Leverage Apple’s Endpoint Security and Network Extension frameworks to build real-time monitoring tools

This comprehensive guide provides you with the knowledge to develop tools and techniques, and to neutralize threats before it’s too late.
Foreword
Acknowledgments
Introduction

Part I: Data Collection
Chapter
1. Examining Processes
Chapter 2. Parsing Binaries
Chapter
3. Code Signing
Chapter
4. Network State and Statistics
Chapter
5. Persistence

Part II: System Monitoring
Chapter
6. Log Monitoring
Chapter
7. Network Monitoring
Chapter
8. Endpoint Security
Chapter 9: Muting and Authorization Events

Part III: Tool Creation
Chapter 10: Persistence Enumerator
Chapter 11: Persistence Monitor
Chapter 12: Mic and Webcam Monitor
Chapter 13: DNS Monitor
Chapter
14. Case Studies

Index
Patrick Wardle is the founder of Objective-See, a nonprofit dedicated to creating free, open source macOS security tools and organizing the Objective by the Sea Apple security conference. Wardle is also the co-founder and CEO of DoubleYou, a cybersecurity startup focused on empowering the builders of Apple-focused security tools. Having worked at both NASA and the National Security Agency and having presented at countless security conferences, he is intimately familiar with aliens, spies, and talking nerdy.