mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 14:08:26 +00:00
GITBOOK-4166: change request with no subject merged in GitBook
This commit is contained in:
parent
3ce30a548d
commit
e0fc725d40
3 changed files with 9 additions and 3 deletions
|
@ -179,7 +179,7 @@
|
||||||
* [macOS .Net Applications Injection](macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-.net-applications-injection.md)
|
* [macOS .Net Applications Injection](macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-.net-applications-injection.md)
|
||||||
* [macOS Security Protections](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/README.md)
|
* [macOS Security Protections](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/README.md)
|
||||||
* [macOS Gatekeeper / Quarantine / XProtect](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-gatekeeper.md)
|
* [macOS Gatekeeper / Quarantine / XProtect](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-gatekeeper.md)
|
||||||
* [macOS Launch/Environment Constraints](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-launch-environment-constraints.md)
|
* [macOS Launch/Environment Constraints & Trust Cache](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-launch-environment-constraints.md)
|
||||||
* [macOS Sandbox](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/README.md)
|
* [macOS Sandbox](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/README.md)
|
||||||
* [macOS Default Sandbox Debug](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-default-sandbox-debug.md)
|
* [macOS Default Sandbox Debug](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-default-sandbox-debug.md)
|
||||||
* [macOS Sandbox Debug & Bypass](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-sandbox-debug-and-bypass/README.md)
|
* [macOS Sandbox Debug & Bypass](macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-sandbox-debug-and-bypass/README.md)
|
||||||
|
|
|
@ -120,6 +120,8 @@ Allow to modify files inside apps bundle (inside app.app), which is **disallowed
|
||||||
|
|
||||||
<figure><img src="../../../.gitbook/assets/image (2).png" alt=""><figcaption></figcaption></figure>
|
<figure><img src="../../../.gitbook/assets/image (2).png" alt=""><figcaption></figcaption></figure>
|
||||||
|
|
||||||
|
It's possible to check who has this access in _System Settings_ > _Privacy & Security_ > _App Management._
|
||||||
|
|
||||||
## Medium
|
## Medium
|
||||||
|
|
||||||
### `com.apple.security.cs.allow-jit`
|
### `com.apple.security.cs.allow-jit`
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# macOS Launch/Environment Constraints
|
# macOS Launch/Environment Constraints & Trust Cache
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
|
|
||||||
|
@ -63,7 +63,7 @@ Category 1:
|
||||||
|
|
||||||
* `(on-authorized-authapfs-volume || on-system-volume)`: Must be in System or Cryptexes volume.
|
* `(on-authorized-authapfs-volume || on-system-volume)`: Must be in System or Cryptexes volume.
|
||||||
* `launch-type == 1`: Must be a system service (plist in LaunchDaemons).
|
* `launch-type == 1`: Must be a system service (plist in LaunchDaemons).
|
||||||
*   `validation-category == 1`: An operating system executable.
|
* `validation-category == 1`: An operating system executable.
|
||||||
* `is-init-proc`: Launchd
|
* `is-init-proc`: Launchd
|
||||||
|
|
||||||
### Reversing LC Categories
|
### Reversing LC Categories
|
||||||
|
@ -90,6 +90,10 @@ In **macOS** there are a few trust caches:
|
||||||
|
|
||||||
And in iOS it looks like it's in **`/usr/standalone/firmware/FUD/StaticTrustCache.img4`**.
|
And in iOS it looks like it's in **`/usr/standalone/firmware/FUD/StaticTrustCache.img4`**.
|
||||||
|
|
||||||
|
{% hint style="warning" %}
|
||||||
|
On macOS running on Apple Silicon devices, if an Apple signed binary is not in the trust cache, AMFI will refuse to load it.
|
||||||
|
{% endhint %}
|
||||||
|
|
||||||
### Enumerating Trust Caches
|
### Enumerating Trust Caches
|
||||||
|
|
||||||
The previous trust cache files are in format **IMG4** and **IM4P**, being IM4P the payload section of a IMG4 format.
|
The previous trust cache files are in format **IMG4** and **IM4P**, being IM4P the payload section of a IMG4 format.
|
||||||
|
|
Loading…
Add table
Reference in a new issue