Loading…
BruCON 0x07 has ended
This schedule is subject to change, check back regularly. 
Registrations start at 8h30! 
Workshop rooms in the location Novotel are 5 minutes walking from the main venue. 
IMPORTANT notice on the use of SCHED.org!
back to BruCON web site
TIP: to see as grid: click on the "Schedule button"  
Thursday, October 8 • 12:00pm - 1:00pm
OSXCollector: Automated forensic evidence collection & analysis for OS X

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

We use Macs a lot at Yelp, which means that we see our fair share of Mac-specific security alerts. Host based detectors will tell us about known malware infestations or weird new startup items. Network based detectors see potential C2 callouts or DNS requests to resolve suspicious domains. Sometimes our awesome employees just let us know, “I think I have like Stuxnet or conficker or something on my laptop.”

When alerts fire, our incident response team’s first goal is to “stop the bleeding” – to contain and then eradicate the threat. Next, we move to “root cause the alert” – figuring out exactly what happened and how we’ll prevent it in the future. One of our primary tools for root causing OS X alerts is OSXCollector.

OSXCollector (https://github.com/Yelp/OSXCollector) is an open source forensic evidence collection and analysis toolkit for OS X. It was developed in-house at Yelp to automate the digital forensics and incident response (DFIR) our crack team of responders had been doing manually.


Speakers
avatar for Kuba Sendor

Kuba Sendor

Engineering Manager, Yelp
Kuba Sendor (@jsendor) is working at Yelp security team where he automates malware incident response and together with his teammates makes sure that Yelp's infrastructure stays secure. Previously he worked at SAP in the Security and Trust research group where he participated in the... Read More →



Thursday October 8, 2015 12:00pm - 1:00pm CEST
01. Westvleteren University

Attendees (0)