First, this scenario assumes malicious code is running on a victim’s MacOS (w/ Little Stitch running) and needs to make an outbound C2 connection. No special privileges or access is available to the malicious software that’s executing the outbound connection. …
➤ Read More: https://rhinosecuritylabs.com/network-security/bypassing-little-snitch-firewall/