og-apple-security

apple gif

This repository comprises my notes on Apple security—primarily macOS—with a focus on detection engineering, threat hunting, and reversing. High-level folders include a file prepended with “START,” which introduces the fundamentals of each topic and highlights relevant macOS/Apple security topics for detection workflows. Where hands-on experience is beneficial (for example, Objective-C programming or Xcode feature exploration), I link to external resources to gain these skills. To integrate these notes into your specific needs, I recommend extracting relevant sections and using AI to query details, create flashcards or adapt the material for your detection-engineering setup/workflow/whatnot. Also, some code in this repository is not mine, and are things I have learned from workshops or books; hence, GPLv3.0 license. The text in this repository is licensed CC BY-SA 4.0.

START topics

In the order I recommend:

  • Objective-C
  • [optional] Swift
  • ESF
  • cover Plists, launch agents, and daemons system daemons
  • ARM
    • proof all arm
  • EDR/EDX section
    • internals of them
  • Reversing
    • Static
    • at some point do signature-based analysis of Apple binaries workshop
    • Dynamic
  • Scripting

Resources

Websites

Books

  • The Art of Computer Virus Research and Defense by Peter Szor (Addison-Wesley, 2005)

macOS Internals

iOS

Reversing

ARM Assembly

Communities

Olivia’s TODOs

  • document how folder is organized / setup doc navigation
  • upload language docs
  • make sure the macOS internals start links to the ARM START since ARM internals is covered in the languarge folde r

finish

  • ARM book breakdown
  • TOAMM 1 notes folder
  • parellels setup for malware
  • OSX PPC
    • vtable pointers, vtables

Create

  • do a section on Grand Central Dispatch (GCD), how it relates to swift, objective-c, macos internals, and security
  • descriptions of all the macOS frameworks like AppKit, Foundation, and newer Swift-only frameworks like SwiftUI
  • TDE ESF coverage
  • red canary research
  • swift concurrency coverage / what category should I put this in?
  • In kernel (EL1) and hypervisor (EL2) modes, Apple uses an implementation-defined PAC algorithm (a variant of ARM’s QARMA cipher with Apple’s customizations).
  • quarinetine
  • llvm, llvm ir, langauages IL steps in binja
  • entitlements
  • Kernel Integrity Protection

  • Apple’s Automated Device Enrollment (ADE) and the 
  • Apple Push Notification service (APNs)
  • Apple Business Manager (ABM)
  • Apple School Manager (ASM)
  • filevault
  • gatekeeper

Contributions

How to format books notes

We want definitions bold

  • give AI prompt for this