Book description
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
- Provides relevant information including some of the latest OS X threats
- Easily accessible to those without any prior OS X experience
- Useful tips and strategies for exploiting and compromising OS X systems
- Includes discussion of defensive and countermeasure applications and how to use them
- Covers mobile IOS vulnerabilities
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Forward
- Chapter 1. Introduction
- Chapter 2. History and Introduction to OSX
-
Chapter 3. The Filesystem
- Introduction
- What is a File System?
- The Difference Between Memory Types
- Partition Tables
- Identifying GUIDs
- Booting
- Master Boot Records
- Blessed be Thy Volume
- Booting from the Network
- Working up to HFS+
- How a File System Works
- File System Addressing
- Disk Fragmentation
- The File System Forefathers
- File System Layouts
- Hierarchical File System (circa 1985)
- Microsoft File Systems
- HFS Plus
- Journaled HFS
- MetaData
- Understanding Forks
- Fiddling with the File System
- Playing with Attributes
- Hidden Files
- Conclusion
- Chapter 4. Footprinting OSX
-
Chapter 5. Application and System Vulnerabilities
- Introduction
- Understanding Vulnerabilities
- Vulnerabilities are Equal Opportunity
- Media Layers
- Host Layers
- History of Vulnerabilities in Apple Products
- Mac OS X Specific
- A Recent Example—Flashback
- How it Works
- Understanding Apple’s Security Response
- Apple iOS Specific
- Keeping it Under Control
- Advanced Persistent Threats
- Apple Script
- Conclusion
- Chapter 6. Defensive Applications
- Chapter 7. Offensive Tactics
- Chapter 8. Reverse Engineering
- Chapter 9. Mobile Platforms
- Chapter 10. Mac OS X Tips and Tricks
- Index
Product information
- Title: The Hacker's Guide to OS X
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9781597499545
You might also like
book
Mastering Reverse Engineering
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like …
book
Learning Malware Analysis
Understand malware analysis and its practical implementation About This Book Explore the key concepts of malware …
book
Attacking Network Protocols
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug …
book
C++ Crash Course
Upgrade your Code with C++ C++ is one of the most widely used languages for real-world …