▲ | egorfine a day ago | ||||||||||||||||
> the shell is recorded and send to a central tool Challenge accepted. And it's not a huge challenge. I'd say not even a mild one. | |||||||||||||||||
▲ | mugsie a day ago | parent | next [-] | ||||||||||||||||
yup, its really not that hard to break, but to break without the tool noticing is harder. they usually work in kernel extensions or use https://developer.apple.com/documentation/endpointsecurity - which gives them pretty good coverage of all the processes running, and arguments etc | |||||||||||||||||
▲ | boomlinde a day ago | parent | prev [-] | ||||||||||||||||
What challenge? | |||||||||||||||||
|