A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


How we reverse engineered OSX/Pirrit, got legal threats and survived - Amit Serper (BSidesCharm 2018) (Hacking Illustrated Series InfoSec Tutorial Videos)

How we reverse engineered OSX/Pirrit, got legal threats and survived

Amit Serper
@0xamit

BSidesCharm 2018
http://www.bsidescharm.com

What if I told you that you have a piece of software on your machine that runs with root privileges, injects data into your browser without you even knowing, makes itself impossible to remove, and it heavily impacts the performance if your machine? Join me for a session about OSX malware reverse engineering, the legal threats that we got from the malware authors, IDA screenshots and opsec fails.

Amit leads the security research at Cybereason's Boston HQ. He specializes in low-level, vulnerability and kernel research, malware analysis and reverse engineering. Whenever he is not taking apart malware and exploring the dark and undocumented corners of operating systems at the office, you could find him in his lab at home reverse engineering routers and other IoT devices and finding horrible bugs on them. Prior to joining Cybereason, Amit spent nine years leading security research projects and teams for the Israeli government, specifically in embedded system security.

Back to BSidesCharm 2018 list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast