在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称(OpenSource Name):droe/xnumon开源软件地址(OpenSource Url):https://github.com/droe/xnumon开源编程语言(OpenSource Language):C 90.8%开源软件介绍(OpenSource Introduction):xnumon - monitor macOS for malicious activityProject StatusTo fully support macOS 10.15 Catalina, including reliable acquisition of
executable images, xnumon will need major refactoring in order to replace the
kernel extension and Overviewxnumon is a monitoring agent that produces system activity logs intended to be suitable for monitoring potentially large fleets of macOS systems for malware and intrusions. It aims at providing similar capabilities on macOS that sysmon provides on Windows. Currently implemented are the following log events:
* stable xnumon provides context information such as executable image hashes, code signature meta-data, script shebang handling, and the history of previous executable images that led to the current process state. It does so by tracking fork and other syscalls instead of relying only on the ppid, which can change over the lifetime of a process. For the reliable acquisition of image hashes even from short-living or self-modifying executables, xnumon comes with an optional kernel extension. xnumon is configurable. It supports different log formats and hash algorithms. In order to reduce log volume close to the source, xnumon implements a number of suppression mechanisms and allows tuning the level of information per event. The log subsystem was designed to be easy to extend with custom log drivers. RequirementsA supported version of macOS, currently:
Releases of xnumon are considered safe to deploy in production environments. DocumentationSee the xnumon wiki for further documentation. While the wiki is still work in progress, some useful starting points:
InstallingThe installer package published on the
xnumon website
will install the daemon, the control utility and a default configuration which
by default will log to As of macOS 10.13 High Sierra, the kext needs to be explicitly approved by the
user before it can be loaded. For enterprise deployments, you will want to
allow the Team ID C9BFEG985N to bypass user approval using The extensively commented
default configuration
is installed to
In addition to installing xnumon, you will want to make sure that auditd does
not clobber the global kernel audit policy. Make sure the In order to make the logs useful and to get them out of reach of malware and
attackers, it is recommended to continuously forward logs to central log
collection infrastructure. A minimal sample Splunk configuration for ingesting
xnumon logs can be found in Uninstalling
This will remove all traces of this package from your system, including logs
at the default location Build DependenciesBuilding an unsigned userland binary and kernel extension requires Xcode command line tools. The userland binary requires only the CoreFoundation and Security frameworks and libbsm; there are no third-party dependencies. Building a signed userland binary requires an Application Developer ID certificate from Apple. Building a signed kernel extension requires a Kext Developer ID certificate from Apple. Building signed binary packages requires DebuggingUse Use the metrics in eventcode 1 events to monitor xnumon internals, possibly reducing the interval it gets generated in the configuration. Enable For short-term debugging during development you can also just unload xnumon
using Pass To load an unsigned, modified kext for testing and development, you need to
disable System Integrity Protection (SIP) for kexts. Reboot to Recovery OS by
pressing cmd⌘+r during boot and from within the repair
console, run Copyright and LicenseCopyright (c) 2017-2019, Daniel Roethlisberger. See |
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论