SlideShare a Scribd company logo
Securing your MAC and Safe
Surfing, Tips and Tricks
Michael Gough – Founder
MalwareArchaeology.com
MalwareArchaeology.com
Who am I
• Blue Team Defender Ninja, Malware Archaeologist, Logoholic
• I love “properly” configured logs – they tell us Who, What, Where,
When and hopefully How
Creator of
“Windows Logging Cheat Sheet”
“Windows File Auditing Cheat Sheet”
“Windows Registry Auditing Cheat Sheet”
“Windows PowerShell Logging Cheat Sheet”
“Windows Splunk Logging Cheat Sheet”
“Malware Management Framework”
• Co-Creator of “Log-MD” – Log Malicious Discovery Tool
– With @Boettcherpwned – Brakeing Down Security PodCast
• @HackerHurricane also my Blog
MalwareArchaeology.com
Stats
MalwareArchaeology.com
MAC’s don’t get viruses
• Wrong !
• MAC use is growing
• More malware
– 815 in 2015
• AV-Test states 0.06%
– Windows is KING
MalwareArchaeology.com
MAC Malware
• Most are Unwanted Applications - USER
MalwareArchaeology.com
MAC Malware
MalwareArchaeology.com
MAC Malware
MalwareArchaeology.com
AV for the Mac
• Stick with the BIG names
• Free is NOT better
• Sophos
MalwareArchaeology.com
Gatekeeper
• Designed to protect users by only allowing
“approved” software
• Patrick Wardle with SynAck found a
vulnerability in 2015
• Apple issued a patch in January 2016
• Most MAC infections will come from users
installing bad or malicious software
MalwareArchaeology.com
RansomWare
• This first MAC RansomWare was seen in 2016
– KeRanger
• Fake BitTorrent client
• User approves and installs
MalwareArchaeology.com
Tools
MalwareArchaeology.com
Little Snitch
• Firewall / Network Monitor App
• Watches any communication and alerts you to
outbound traffic
• https://www.obdev.at/products/littlesnitch/in
dex.html
MalwareArchaeology.com
A MUST HAVE website
• https://objective-see.com/index.html
MalwareArchaeology.com
Logging
MalwareArchaeology.com
Logging
System log
• The main system log is found simply by opening the Console application. It is found in
the "Utilities" folder inside the computer's "Applications" folder.
Printing logs
• The CUPS printing subsystem in Mac OS X 10.2 and later keeps its logs in the following
location:
– /var/log/cups/error_log
Crash logs
• When individual applications like Microsoft Word or Apple Mail crash, the operating
system will create a crash log. These log files are organized by application and stored in:
– ~/Library/Logs/
• The crash logs can be opened in the Console utility, or displayed in the Apple System
Profiler program.
• Crash logs may be useful to technical staff. They can be invaluable to vendors wishing to
fix problems in programs, as well.
Kernel panic log
• A kernel panic is a very rare event in Mac OS X. In Mac OS X 10.2, you will see the
following information on your screen if you have a kernel panic:
MalwareArchaeology.com
Logging
• You may want additional debug information
• You have to enable it
• sudo launchctl log level debug
MalwareArchaeology.com
Logging
Console – Built in App
– Applications – Utilities - Console
3rd Party log viewers
• LogrPro
– https://lograpp.wordpress.com/
• Log File Navigator
– http://lnav.org/
MalwareArchaeology.com
Logging
• LogTail App – can do over SSH
– http://www.logtailapp.com/
• LogMX – CSV
– http://www.logmx.com/download
• LogDiver
– http://www.logdiver.com/
MalwareArchaeology.com
Cron files
• Scheduled jobs
Cron tabs
• /etc/crontab
• /usr/lib/cron/tabs/*
MalwareArchaeology.com
The Web
MalwareArchaeology.com
Safe Browsing
• Aviator – Secure by design
– https://www.whitehatsec.com/terms-conditions/aviator/
Safari
• Incognito for Safari – Surf anonymously
• Web of Trust (WOT) – URL reputation
MalwareArchaeology.com
Safe Browsing
Plugins for Chrome and FireFox
• LastPass – Password manager
• Xmarks – bookmark sync
• HTTPS Everywhere – Force HTTPS
• uBlock Origin – Block offsite content
• Ad Block+ - Block Ads
• Web of Trust (WOT) – URL reputation
MalwareArchaeology.com
Windoz
MalwareArchaeology.com
You a Windows user?
• New tool to help you audit the logging settings
• Helps you enable the proper logging
• Harvests the logs only if properly set
• Performs full filesystem hash baseline
• Performs full registry baseline
• SRUM data from Win 8.1 and 10
• AutoRuns report
• 25+ reports
MalwareArchaeology.com
Resources
• Websites
– MalwareArchaeology.com
– Log-MD.com The tool
• The “Windows Logging Cheat Sheet”
– MalwareArchaeology.com
• Malware Analysis Report links too
– To start your Malware Management program
MalwareArchaeology.com
Questions?
• You can find us at:
• @HackerHurricane
• Log-MD.com
• MalwareArchaeology.com
• HackerHurricane.com (blog)
• http://www.slideshare.net
MalwareArchaeology.com

More Related Content

PDF
RMISC logging for hackers
PDF
What can you do about ransomware
PDF
Logging for Hackers - What you need to know to catch them
PDF
Deeplook into apt and how to detect and defend v1.0
PDF
Logging for hackers SAINTCON
PDF
Secure Yourself, Practice what we preach - BSides Austin 2015
PDF
Email keeps getting us pwned v1.1
PDF
Sandbox vs manual analysis v2.1
RMISC logging for hackers
What can you do about ransomware
Logging for Hackers - What you need to know to catch them
Deeplook into apt and how to detect and defend v1.0
Logging for hackers SAINTCON
Secure Yourself, Practice what we preach - BSides Austin 2015
Email keeps getting us pwned v1.1
Sandbox vs manual analysis v2.1

What's hot (20)

PDF
Email keeps getting us pwned - Avoiding Ransomware and malware
PDF
DIR ISF - Email keeps getting us pwned v1.1
PDF
Info sec is not daunting v1.0
PDF
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
PDF
Email keeps getting us pwned v1.0
PDF
Sandbox vs manual malware analysis v1.1
PDF
Finding attacks with these 6 events
PDF
Ask a Malware Archaeologist
PDF
InnoTech 2017_Defend_Against_Ransomware 3.0
PDF
Commodity malware means YOU
PDF
Logging for Hackers v1.0
PDF
Proper logging can catch breaches like retail PoS
PDF
Logs, Logs, Logs - What you need to know to catch a thief
PDF
Malware Management - HouSecCon 2014
PDF
Windows IR made easier and faster v1.0
PDF
You need a PROcess to catch running processes and their modules_v2.0
PDF
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
PDF
Cred stealing emails bsides austin_2018 v1.0
PDF
Detecting WMI Exploitation v1.1
PDF
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
Email keeps getting us pwned - Avoiding Ransomware and malware
DIR ISF - Email keeps getting us pwned v1.1
Info sec is not daunting v1.0
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Email keeps getting us pwned v1.0
Sandbox vs manual malware analysis v1.1
Finding attacks with these 6 events
Ask a Malware Archaeologist
InnoTech 2017_Defend_Against_Ransomware 3.0
Commodity malware means YOU
Logging for Hackers v1.0
Proper logging can catch breaches like retail PoS
Logs, Logs, Logs - What you need to know to catch a thief
Malware Management - HouSecCon 2014
Windows IR made easier and faster v1.0
You need a PROcess to catch running processes and their modules_v2.0
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
Cred stealing emails bsides austin_2018 v1.0
Detecting WMI Exploitation v1.1
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
Ad

Similar to Mw arch mac_tips and tricks v1.0 (20)

PPTX
Application Explosion How to Manage Productivity vs Security
PDF
CMS Hacking Tricks - DerbyCon 4 - 2014
PDF
When Security Tools Fail You
PDF
Attacking and Defending Mobile Applications
PDF
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
PPTX
Manual JavaScript Analysis Is A Bug
PPTX
Security Vulnerabilities in Mobile Applications (Kristaps Felzenbergs)
PDF
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
PPTX
Building your Open Source Security stack
PDF
Computer security
PDF
SANS Digital Forensics and Incident Response Poster 2012
PDF
Construye tu stack de ciberseguridad con open source
PDF
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
PDF
soctool.pdf
PPTX
Java Web Security Class
PDF
Defending against Ransomware and what you can do about it
PPTX
OSX/Pirrit: The blue balls of OS X adware
PPTX
Malware Analysis
PDF
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
PDF
Securing the Apache web server
Application Explosion How to Manage Productivity vs Security
CMS Hacking Tricks - DerbyCon 4 - 2014
When Security Tools Fail You
Attacking and Defending Mobile Applications
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
Manual JavaScript Analysis Is A Bug
Security Vulnerabilities in Mobile Applications (Kristaps Felzenbergs)
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
Building your Open Source Security stack
Computer security
SANS Digital Forensics and Incident Response Poster 2012
Construye tu stack de ciberseguridad con open source
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
soctool.pdf
Java Web Security Class
Defending against Ransomware and what you can do about it
OSX/Pirrit: The blue balls of OS X adware
Malware Analysis
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
Securing the Apache web server
Ad

More from Michael Gough (8)

PDF
Hacking a backup power solution(s) for your home, Tornado tested!
PDF
My InfoSec journey led me to create my own IR tools, how, and why you should too
PPTX
Incident Response Fails
PDF
Windows Incident Response is hard, but doesn't have to be
PDF
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
PDF
MITRE AttACK framework it is time you took notice_v1.0
PDF
You can detect PowerShell attacks
PDF
Proper logging can catch breaches like retail PoS
Hacking a backup power solution(s) for your home, Tornado tested!
My InfoSec journey led me to create my own IR tools, how, and why you should too
Incident Response Fails
Windows Incident Response is hard, but doesn't have to be
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
MITRE AttACK framework it is time you took notice_v1.0
You can detect PowerShell attacks
Proper logging can catch breaches like retail PoS

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hybrid model detection and classification of lung cancer
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Tartificialntelligence_presentation.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
A comparative study of natural language inference in Swahili using monolingua...
OMC Textile Division Presentation 2021.pptx
cloud_computing_Infrastucture_as_cloud_p
Digital-Transformation-Roadmap-for-Companies.pptx
1. Introduction to Computer Programming.pptx
DP Operators-handbook-extract for the Mautical Institute
Hybrid model detection and classification of lung cancer
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
WOOl fibre morphology and structure.pdf for textiles
A novel scalable deep ensemble learning framework for big data classification...
A comparative analysis of optical character recognition models for extracting...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
TLE Review Electricity (Electricity).pptx
MIND Revenue Release Quarter 2 2025 Press Release
Tartificialntelligence_presentation.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Assigned Numbers - 2025 - Bluetooth® Document

Mw arch mac_tips and tricks v1.0

  • 1. Securing your MAC and Safe Surfing, Tips and Tricks Michael Gough – Founder MalwareArchaeology.com MalwareArchaeology.com
  • 2. Who am I • Blue Team Defender Ninja, Malware Archaeologist, Logoholic • I love “properly” configured logs – they tell us Who, What, Where, When and hopefully How Creator of “Windows Logging Cheat Sheet” “Windows File Auditing Cheat Sheet” “Windows Registry Auditing Cheat Sheet” “Windows PowerShell Logging Cheat Sheet” “Windows Splunk Logging Cheat Sheet” “Malware Management Framework” • Co-Creator of “Log-MD” – Log Malicious Discovery Tool – With @Boettcherpwned – Brakeing Down Security PodCast • @HackerHurricane also my Blog MalwareArchaeology.com
  • 4. MAC’s don’t get viruses • Wrong ! • MAC use is growing • More malware – 815 in 2015 • AV-Test states 0.06% – Windows is KING MalwareArchaeology.com
  • 5. MAC Malware • Most are Unwanted Applications - USER MalwareArchaeology.com
  • 8. AV for the Mac • Stick with the BIG names • Free is NOT better • Sophos MalwareArchaeology.com
  • 9. Gatekeeper • Designed to protect users by only allowing “approved” software • Patrick Wardle with SynAck found a vulnerability in 2015 • Apple issued a patch in January 2016 • Most MAC infections will come from users installing bad or malicious software MalwareArchaeology.com
  • 10. RansomWare • This first MAC RansomWare was seen in 2016 – KeRanger • Fake BitTorrent client • User approves and installs MalwareArchaeology.com
  • 12. Little Snitch • Firewall / Network Monitor App • Watches any communication and alerts you to outbound traffic • https://www.obdev.at/products/littlesnitch/in dex.html MalwareArchaeology.com
  • 13. A MUST HAVE website • https://objective-see.com/index.html MalwareArchaeology.com
  • 15. Logging System log • The main system log is found simply by opening the Console application. It is found in the "Utilities" folder inside the computer's "Applications" folder. Printing logs • The CUPS printing subsystem in Mac OS X 10.2 and later keeps its logs in the following location: – /var/log/cups/error_log Crash logs • When individual applications like Microsoft Word or Apple Mail crash, the operating system will create a crash log. These log files are organized by application and stored in: – ~/Library/Logs/ • The crash logs can be opened in the Console utility, or displayed in the Apple System Profiler program. • Crash logs may be useful to technical staff. They can be invaluable to vendors wishing to fix problems in programs, as well. Kernel panic log • A kernel panic is a very rare event in Mac OS X. In Mac OS X 10.2, you will see the following information on your screen if you have a kernel panic: MalwareArchaeology.com
  • 16. Logging • You may want additional debug information • You have to enable it • sudo launchctl log level debug MalwareArchaeology.com
  • 17. Logging Console – Built in App – Applications – Utilities - Console 3rd Party log viewers • LogrPro – https://lograpp.wordpress.com/ • Log File Navigator – http://lnav.org/ MalwareArchaeology.com
  • 18. Logging • LogTail App – can do over SSH – http://www.logtailapp.com/ • LogMX – CSV – http://www.logmx.com/download • LogDiver – http://www.logdiver.com/ MalwareArchaeology.com
  • 19. Cron files • Scheduled jobs Cron tabs • /etc/crontab • /usr/lib/cron/tabs/* MalwareArchaeology.com
  • 21. Safe Browsing • Aviator – Secure by design – https://www.whitehatsec.com/terms-conditions/aviator/ Safari • Incognito for Safari – Surf anonymously • Web of Trust (WOT) – URL reputation MalwareArchaeology.com
  • 22. Safe Browsing Plugins for Chrome and FireFox • LastPass – Password manager • Xmarks – bookmark sync • HTTPS Everywhere – Force HTTPS • uBlock Origin – Block offsite content • Ad Block+ - Block Ads • Web of Trust (WOT) – URL reputation MalwareArchaeology.com
  • 24. You a Windows user? • New tool to help you audit the logging settings • Helps you enable the proper logging • Harvests the logs only if properly set • Performs full filesystem hash baseline • Performs full registry baseline • SRUM data from Win 8.1 and 10 • AutoRuns report • 25+ reports MalwareArchaeology.com
  • 25. Resources • Websites – MalwareArchaeology.com – Log-MD.com The tool • The “Windows Logging Cheat Sheet” – MalwareArchaeology.com • Malware Analysis Report links too – To start your Malware Management program MalwareArchaeology.com
  • 26. Questions? • You can find us at: • @HackerHurricane • Log-MD.com • MalwareArchaeology.com • HackerHurricane.com (blog) • http://www.slideshare.net MalwareArchaeology.com