You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
These items are stored in the file /Users/<username>/Library/Application Support/com.apple.backgroundtaskmanagementagent
339
+
339
340
### At
340
341
341
342
“At tasks” are used to **schedule tasks at specific times**.
@@ -649,7 +650,7 @@ However, there are 2 types of dylib hijacking:
649
650
650
651
The way to **escalate privileges** abusing this functionality would be in the rare case that an **application** being executed **by****root** is **looking** for some **library in some folder where the attacker has write permissions.**
651
652
652
-
**A nice scanner to find missing libraries in applications is**[**Dylib Hijack Scanner**](https://objective-see.com/products/dhs.html)**.
653
+
**A nice scanner to find missing libraries in applications is**[**Dylib Hijack Scanner**](https://objective-see.com/products/dhs.html)**or a**[**CLI version**](https://github.com/pandazheng/DylibHijack)**.
653
654
A nice report with technical details about this technique can be found**[**here**](https://www.virusbulletin.com/virusbulletin/2015/03/dylib-hijacking-os-x)**.**
654
655
655
656
### **DYLD\_INSERT\_LIBRARIES**
@@ -660,6 +661,14 @@ This is like the [**LD\_PRELOAD on Linux**](../../linux-unix/privilege-escalatio
660
661
661
662
This technique may be also **used as an ASEP technique** as every application installed has a plist called "Info.plist" that allows for the **assigning of environmental variables** using a key called `LSEnvironmental`.
662
663
664
+
{% hint style="info" %}
665
+
Since 2012 when [OSX.FlashBack.B](https://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_b.shtml)\[22\] abused this technique, **Apple has drastically reduced the “power”** of the DYLD\_INSERT\_LIBRARIES.
666
+
667
+
For example the dynamic loader \(dyld\) ignores the DYLD\_INSERT\_LIBRARIES environment variable in a wide range of cases, such as setuid and platform binaries. And, starting with macOS Catalina, only 3rd-party applications that are not compiled with the hardened runtime \(which “protects the runtime integrity of software” \[22\]\), or have an exception such as the com.apple.security.cs.allow-dyld-environment-variables entitlement\) are susceptible to dylib insertions.
668
+
669
+
For more details on the security features afforded by the hardened runtime, see Apple’s documentation: “[Hardened Runtime](https://developer.apple.com/documentation/security/hardened_runtime)”
670
+
{% endhint %}
671
+
663
672
## Crons
664
673
665
674
In MacOS several folders executing scripts with **certain frequency** can be found in:
@@ -747,3 +756,7 @@ networksetup -getwebproxy Wi-Fi #Wifi Web proxy
0 commit comments