

app's :D /Lrh83K85ppĪs you may know, in previous versions of macOS it was possible to name a file as. Playing around with some filetype phishing on MacOS. So just how can we craft a convincing campaign to compromise our targets machine? Just send them an appĪ few weeks ago (actually months, this post has been in draft for a while), I posted a quick screenshot on Twitter showing just how we can hide an app for our phishing purposes: Obviously acquiring certificates by any nefarious means would not be acceptable, which means we are generally left with the option of either purchasing a valid developer account, finding a nice Gatekeeper workaround, or extending our social engineering campaign to convince a user to bypass Gatekeeper.įor the remainder of this post we will assume the first option, however when delivering your campaign, it is important to factor in the obvious shortcomings of having your developer cert attached to your malware.

That’s right, malware writers are simply using valid developer accounts. Looking at malware reports, we can quickly see just how this is being bypassed in the wild:
#Mac file extensions for apps code
Here we see a nice dialog from macOS indicating that the application downloaded is untrusted, mainly because of a missing code signing certificate.ĭuring an engagement, of course our job is to emulate some of the techniques used by real adversaries. Gatekeeper is macOS’s first line of defense against malicious applications being downloaded from the Internet.Īny regular Mac user will be familiar with the following prompt: So what are the barriers we face when coming up against a macOS system? Surprisingly the first is one of the most simple to work around, Gatekeeper.
#Mac file extensions for apps full
In this post I wanted to show a few of the outtakes from our research which didn’t quite make up a full post, and provide a few tricks which may help you to gain a foothold during your next macOS engagement. If we take a look around, there are few posts or teardowns that show viable techniques we can use when targeting macOS. The same unfortunately can’t be said for macOS systems. If you follow our research over on MDSec’s blog, you will have seen a number of posts documenting macOS research we’ve recently completed.Īs RedTeamer’s, we have a wealth of information available to us when it comes to attacking Windows endpoints, whether that be via a HTA, OLE, a macro office document or even simply binary hiding as a legitimate application, we are never short of options to gain access to a targets machine when phishing. « Back to home macOS Research Outtakes - File Extensions
