A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Incident response on macOS - Thomas Reed Derbycon 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

Incident response on macOS
Thomas Reed
Derbycon 2019

All too often, admins simply reimage an infected Mac, losing vital information in the process. Learn how to analyze a Mac that you suspect has been infected: what artifacts to collect, and how to parse out what happened. You'll learn about the techniques malware is currently using, with concrete examples, as well as some things that malware could do in the future but hasn't yet. Suspicious behaviors that can help identify processes as malicious will also be discussed. These lessons will be illustrated with examples from real-world malware.

Thomas Reed has been working with Macs since 1984, and is a self-taught security researcher and the creator of the AdwareMedic anti-adware tool for Macs. He now directs the development of Mac and mobile products at Malwarebytes, and continues to do malware analysis and threat research.

@thomasareed

Back to Derbycon 2019 video list

Printable version of this article

15 most recent posts on Irongeek.com:


    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2019, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast