LuLu 2.3.2
LuLu — это бесплатный брандмауэр с общим источником для macOS. Цель проста; заблокировать любые неизвестные исходящие соединения, пока они не будут одобрены пользователем. Хотя он был разработан для общего обнаружения вредоносных программ путем пометки несанкционированных сетевых соединений, LuLu также может использоваться для блокирования компонентов ОС или сторонних приложений от передачи информации на удаленные серверы.
Что понравится в LuLu? Много!
100% бесплатно
Как и в отсутствие рекламы, никаких временных испытаний, отсутствующих функций. Потому что почему бы и нет !?
И нет, он не отслеживает, не контролирует и не шпионит за вами, поскольку это было бы просто чистым злом!
Общий источник
Полный исходный код для LuLu доступен на GitHub. Такая прозрачность позволяет любому проверять свой код или точно понимать, что происходит.
Защищает
LuLu стремится предупредить вас о попытках попытки несанкционированного сетевого подключения. Таким образом, он может в целом обнаруживать вредоносное ПО или использоваться для блокировки законных приложений, которые могут передавать личные данные на удаленные серверы.
Простой
«Сделай одно, делай это хорошо!» LuLu разработан как можно проще. Конечно, это означает, что сложные функции могут быть недоступны, но это также означает, что это проще в использовании и имеет меньшую поверхность атаки!
Сетевой мониторинг
По дизайну LuLu контролирует только исходящие сетевые подключения. Встроенный брандмауэр Apple отлично справляется с блокировкой несанкционированных входящих соединений.
Правила
В настоящее время LuLu поддерживает только правила на уровне процесса, что означает, что процессу (или приложению) разрешено подключаться к сети или нет. Как и в случае с другими брандмауэрами, это также означает, что если законный (разрешенный) процесс злоупотребляется вредоносным кодом для выполнения сетевых действий, это будет разрешено.
Один пользователь
На данный момент LuLu может быть установлен только для одного пользователя. Будущие версии, скорее всего, позволят его установить несколькими пользователями в одной и той же системе.
Самозащита
Законные злоумышленники / специалисты по безопасности знают, что любой инструмент безопасности можно тривиально обойти, если он специально предназначен, даже если инструмент использует передовые механизмы самозащиты. Такие механизмы самозащиты часто сложны для реализации и, в конце концов, почти всегда бесполезны. Таким образом, по дизайну LuLu (в настоящее время) реализует несколько механизмов самозащиты. Например, злоумышленник может перечислять все запущенные процессы, чтобы найти компонент LuLu, ответственный за отображение предупреждений и его завершение (через sigkill).
- macOS Monterey compatibility
Источник
Free Mac Security Tools
download
In today’s connected world, it is rare to find an application or piece of malware that doesn’t talk to a remote server. LuLu is the free, open firewall for Macs, that can protect your network connections and detect malicious activity.
download
Physical access (or «evil maid») attacks are extremely insidious yet highly efficient.
Do Not Disturb detects and alerts you of such attacks!
download
«KnockKnock. Who’s There?» See what’s persistently installed on your Mac. KnockKnock uncovers persistently installed software in order to generically reveal malware.
download
TaskExplorer allows one to visually explore all running tasks (processes). Quickly see a task’s signature status, loaded dylibs, open files, network connection, and much more.
download
Malware and other applications may install persistent keyboard «event taps» to intercept your keystrokes. ReiKey can scan, detect, and monitor for such taps.
download
Netiquette, a network monitor, allows one to explore all network sockets and connections, either via an interactive UI, or from the commandline.
download
BlockBlock provides continual protection by monitoring persistence locations. Any new persistent component will trigger a BlockBlock alert, allowing malicious items be blocked.
download
By continually monitoring the file-system for the creation of encrypted files by suspicious processes, RansomWhere? aims to protect your personal files, generically stopping ransomware in its tracks.
download
Mac malware often spies on users by recording audio and video sessions. sometimes in an undetected manner. OverSight monitors a mac’s mic and webcam, alerting the user when the internal mic is activated, or whenever a process accesses the webcam.
download
Lockdown is an open-source tool for El Capitan that audits and remediates security configuration settings.
download
KextViewr displays all loaded kexts, along with their signing status, full path, VirusTotal detection ratios, and more.
download
Ostiarius is tool for El Capitan that blocks unsigned internet binaries from executing. Though OS X’s Gatekeeper attempts provide this functionality, it’s trivial to bypass.
download
Dylib Hijack Scanner
Dylib hijack scanner or DHS, will scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.
download
What’s Your Sign
What’s Your Sign adds a ^-click menu item to Finder.app . Click it to display the code-signing information about any file.
learn more
Commandline Utilities
Various CLI utilities to facilitate system monitoring and malware analysis.
Looking for an «all-in-one» enterprise endpoint protection solution?
Источник
Lulu mac os big sur
download
LuLu leverages Apple’s new Network Extension framework.
As Apple continues to improve the stability of this framework, it is recommended you upgrade to the latest version of macOS 11 (Big Sur), before installing LuLu.
Looking for an older version (compatible with older versions of macOS)?
To install LuLu, first download the disk archive containing the application. Then double-click LuLu.dmg and drag LuLu.app into the Applications folder:
Once LuLu is installed, it aims to alert you anytime a new or unauthorized outgoing network connection is created.
Here’s a LuLu alert, displayed when LuLu checks for an update (by requesting the remote products.json file): The alert contains information about the process attempting the connection, as well as information about the connection’s destination.
Various elements of the alert are click-able, such as a button to display the process’s code signing information: Other elements include of the alert, that onces clicked provide more information, include:
- Virus Total Information:
Contains an anti-virus detection ratio for process that is attempting to create the outgoing connection. - Process Hierarchy:
Display the hierarchy (ancestry) for the process that is attempting to create the outgoing connection.
To approve the outgoing connection, simply click «Allow» . or click «Block» to prevent it.
Unless you click the «temporarily» button, a persistent rule will be created to remember your decision.
By default, your decision (block or allow) applies to the entire process. That is to say, your decision will be applied to subsequent connections (regardless of their destination) for this process, and any other instances. However, if you select the «Remote Endpoint» option, your decision will be scoped, and only will be applied subsequent connections that match the same (remote) destination:
Process or connections are either allowed to access the network, or blocked, based on LuLu’s rules. The ‘Rules’ window displays these rules:
If signed, a program is identified in the Rules window by name and its code signing (bundle) identifier (e.g. com.objective-see.lulu ).
Using a code signing identifier (vs. a path), allows the rule to be applied even if the program is moved, or updated.
Want to view a program’s path(s)? Simply double click (or ^+click and select «в†’ Show Path(s)») on any program in the Rules window:
The Rules Window
The Rules window can be accessed either by launching LuLu’s application ( /Applications/LuLu.app ), or by clicking on ‘Rules. ‘ in LuLu’s status bar menu: There are several tabs in the rules window, aimed at organizing the rules:
- All Rules:
The first tab shows all of LuLu’s rules. In other words, it is a combination of the default, apple, baseline, user, and unclassified rules. - Default Rules:
The second tab shows LuLu’s default or system rules. These rules (which cannot be deleted via the UI), are for Apple/macOS processes that must be allowed to access to the network in order to preserve system functionality. - Apple Rules:
When the ‘Allow Apple Programs’ option has been selected (either during installation, or via LuLu’s preferences), any process that is signed by Apple proper will be automatically allowed to connect to the network. Also, an ‘Allow’ rule will be created, and will show up under this tab. - 3rd-Party Program Rules:
When the ‘Allow Installed Programs’ option has been selected (either during installation, or via LuLu’s preferences), any applications or program that was (pre)installed will be automatically allowed to connect to the network. Also, an ‘Allow’ rule will be created, and will show up under under this tab. - User Rules:
This tab shows rules the user has created, either manually via the ‘add rule’ button, or by clicking ‘Block’ or ‘Allow’ in a LuLu alert window. - Unclassified Rules:
If you are not logged in, and a process attempts to access the network will be automatically allowed. Also, an ‘Allow’ rule will be created, and will show up under under this tab.
Adding Rules
Generally rules are created in response to an alert (unless the user has selected the «temporarily» button).
To manually add a rule, click on the ‘add rule’ button at the bottom of the rules window. This will bring up an ‘Add Rule’ dialog box:
In this dialog box, enter the path to the program (or click ‘Browse’ to open a file chooser window). Then, enter the remote address or domain, remote port, and finally select ‘Block’ or ‘Allow’. Click ‘Add’ to add the rule, which will be persistently saved, and show up as a ‘User’ rule.
Enter * for «any» (e.g. a program path of * will globally match all programs).
The rule’s remote address/domain can also be a regular expression (though make sure to select the «regex» checkbox if this is the case).
Editing (Updating) Rules
To change a rule, either double click on a rule, or ^ +click and select » в†’ Edit Rule»: This will bring up the «Edit Rule» window. Here you can edit any aspect of the rule:
Deleting Rules
There are several ways to delete a rule. With the rule selected, simply press the «delete» on your keyboard or, ^ +click and select » в†’ Delete Rule»: . or simply click the ‘x’ button on the right hand side of the rule.
Deleting a row that contains program information, will, as expected also remove all its rules.
Also note that default (system) rules cannot be deleted (via the Rules window).
LuLu can be configured via its preferences pane. To open this pane, either in the main LuLu application ( /Applications/LuLu.app ), or via LuLu’s status bar menu, click on ‘Preferences. ‘ The preference pane has three tabs: rules, mode, and update.
The rules tab, allows one to configure how LuLu will (automatically) generate rules, as well as how to specify a global block list:
- ‘Allow Apple Programs’
When this option is selected any process that is signed by Apple proper will be automatically allowed to connect to the network. Also, an ‘allow’ rule will be created, and will show up in the Rules window, under ‘Apple Rules’. - ‘Allow Installed Applications’
When this option is selected any applications (and their components) that were (pre)installed will be automatically allowed to connect to the network. Also, an ‘allow’ rule will be created, and will show up in the Rules window, under ‘Baseline Rules’. - ‘Block List’
When this option is selected, LuLu will automatically block any connection that matches any items in specified block list. The block list can be a local file, or remote url (e.g. https://ceadd.ca/blockyouxlist.txt )
The block list file should contain a (newline-separated) list of url hosts and/or ip addresses to block.
Items in the block listed are matched and applied regardless of the process creating the connection, or any other rules.
For a free (privacy focused) block list, see: blockyouxlist.
Due to limitations of macOS, blocking via host name is only applicable to (as Apple notes) » Network.framework or NSURLSession connections«.
As such, for browsers (such as Chrome), that do not leverage these frameworks, only ip address based blocking is supported.
. as Safari and Firefox leverage such frameworks, they are not subject to this limitation.
The mode tab, allows one to configure LuLu to run in various modes:
- ‘Passive Mode’
When this option is selected, LuLu will run silently without alerts. Existing rules will be applied, and new connections will be automatically allowed. - ‘Block Mode’
When this option is selected, all traffic (that is routed thru LuLu) will be blocked. - ‘No Icon Mode’
When this option is selected, LuLu will run without an icon in the status bar.
You can always manually run /Applications/LuLu.app to disable this preference if you’d like the status bar icon back!
The update tab, allows one to check for new versions, as well as disable the automatic check for new versions of LuLu:
Q: Why is LuLu called LuLu?
A: In Hawaiian, the word ‘LuLu’ means protection, shield, or peace. As this tool aims to instill peace, by providing a protective shield, it seemed the fitting name. And as LuLu, (along with all of Objective-See’s tools) are coded with aloha on the lovely island of Maui, it’s the perfect name!
Q: Do I need LuLu if I’ve turned on the built-in macOS firewall?
A: Yes! Apple’s built-in firewall only blocks incoming connections. LuLu is designed to detect and block outgoing connections, such as those generated by malware when the malware attempts to connect to it’s command & control server for tasking, or exfiltrates data.
Q: Does LuLu conflict with other (paid) macOS firewalls or security products?
A: Although at this point testing has been limited, LuLu appears to play nice with other tools 🙂
Q: I found a bug (or issue) with LuLu. Can you fix it?
A: For sure! If you encounter any issues, create an bug report via GitHub.
Источник