Crescendo : Real Time Event Viewer For MacOS

Crescendo is a swift based, real time event viewer for macOS. It utilizes Apple’s Endpoint Security Framework.

Apple has introduced some new security mechanisms that we need to enable to get Crescendo running.

  • Ensure that you have moved the app to your /Applications director or the system extension will fail to load.
  • For the first run you will be prompted to approve the system extension, after clicking the “Start” button. NOTE: I have noticed that there is an issue where System Preferences won’t show an allow button. I assume this is some internal issue Apple needs to workout. Clicking back to System Preferences and navigating forward again seems to fix the issue.
  • You will need to enable Full Disk Access for the system extension.

Requirements

Crescendo is only compatible with >=10.15.X and at least Xcode 10.

Also Read – HTBenum : A Linux Enumeration Script For Hack The Box

Components

This project consists of three main components:

  • A system extension (CrescendoExtension)
  • A Framework wrapper around the Endpoint Security Framework (Crescendo)
  • An app for viewing events in a nice little user interface (CrescendoApp)

Testing & Development

It is highly recommended to test this code in a virtual machine with SIP disabled, since this project requires the endpoint-security entitlement, TCC, and proper signing when SIP is enabled.

  • Boot into Recovery mode on macOS
  • Disable SIP and AMFI

csrutil disable
nvram boot-args=”amfi_get_out_of_my_way=0x1″

  • Reboot
  • Enable developer mode so our extensions will reload everytime we call OSSystemExtensionManager.shared.submitRequest

systemextensionsctl developer on

Signing

If you wish to sign your own application, it is highly recommend to read Apple’s documentation on System Extension requirements and Notorization.

Signing and entitlement is a non-trivial exercise.

Building

I have included my .xproj file in this release to get folks started. In the future I will likely move to using the new xcconfig file as this seems much more sane of an approach instead of commiting xproj files. If you wish to simply build the example cli application you can do so with Xcode.

In order to build this application and run it on a production macOS system, you will need the endpoint-security entitlement and a developer certificate from Apple.

The Crescendo framework can easily be bundled with any Swift application. I may move to CocoaPods in the future, but I am unfamiliar with them right now.

Issues/Bugs/Features

Please feel free to raise an issue if you wish to see a feature added or encounter an issue. If you wish to contribute a pull request, please just ensure you run swiftlint over your code before contributing.

I will cut releases for the compiled + signed app and include them in the Releases tab as needed.

Troubleshooting

  • If you are running on a production Mac, you should NOT disable SIP or AMFI. Those instructions are for developers wishing to make code changes.
  • Did you enable the system extension by clicking the “Allow” button in System Preferences -> Security & Privacy? If not, you will not see any events.
  • Did you enable full disk access in System Preferences -> Security & Privacy -> Privacy Tab? If not, you will not see any events.
  • If you encounter any issues, open Console.app and search for crescendo or <your_bundle_id>/com.suprhackersteve as a filter, that should assist you in troubleshooting any potential issues. It is also a good idea to check in CrashReporter and see if the extension has crashed or exited with fatalError.
  • If you wish to forcefully unload the system extension, there is a menu item named “Unload System Extension” that will unload it. This action may lead to odd side effects, only do it if you know what you are doing.
  • If you have added a process to the blacklist and it is still allowed to execute, remember to check the real full path. Simply using /Applications/Foo.app, will not be enough to prevent the execution. Also, many macOS applications are launched via xpcproxy.
R K

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

3 days ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

3 days ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

5 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

1 week ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago