O'Reilly logo

The Hacker's Guide to OS X by Alijohn Ghassemlouei, Russ Rogers, Robert Bathurst

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Offensive Tactics

Introduction

You’ve made it this far and now the true fun begins; breaking things or at least thinking of how to break things. From the title of the chapter, we see we’ll be focusing on going on the offensive. But to truly understand how to attack, one must understand why the attack works and how to prevent that attack from occurring. We will illustrate this by splitting the chapter into three sections:

Attack TypesHere we will describe, in a general sense, how the attack works, what it’s meant to do, possible pivot points, and the mechanics of its inner workings.

Stealing DataHow to manipulate the system to remove the data you’ve collected.

SummaryThis is, of course, our closing comments for the chapter and where we ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required