Book description
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
- Provides relevant information including some of the latest OS X threats
- Easily accessible to those without any prior OS X experience
- Useful tips and strategies for exploiting and compromising OS X systems
- Includes discussion of defensive and countermeasure applications and how to use them
- Covers mobile IOS vulnerabilities
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Forward
- Chapter 1. Introduction
- Chapter 2. History and Introduction to OSX
-
Chapter 3. The Filesystem
- Introduction
- What is a File System?
- The Difference Between Memory Types
- Partition Tables
- Identifying GUIDs
- Booting
- Master Boot Records
- Blessed be Thy Volume
- Booting from the Network
- Working up to HFS+
- How a File System Works
- File System Addressing
- Disk Fragmentation
- The File System Forefathers
- File System Layouts
- Hierarchical File System (circa 1985)
- Microsoft File Systems
- HFS Plus
- Journaled HFS
- MetaData
- Understanding Forks
- Fiddling with the File System
- Playing with Attributes
- Hidden Files
- Conclusion
- Chapter 4. Footprinting OSX
-
Chapter 5. Application and System Vulnerabilities
- Introduction
- Understanding Vulnerabilities
- Vulnerabilities are Equal Opportunity
- Media Layers
- Host Layers
- History of Vulnerabilities in Apple Products
- Mac OS X Specific
- A Recent Example—Flashback
- How it Works
- Understanding Apple’s Security Response
- Apple iOS Specific
- Keeping it Under Control
- Advanced Persistent Threats
- Apple Script
- Conclusion
- Chapter 6. Defensive Applications
- Chapter 7. Offensive Tactics
- Chapter 8. Reverse Engineering
- Chapter 9. Mobile Platforms
- Chapter 10. Mac OS X Tips and Tricks
- Index
Product information
- Title: The Hacker's Guide to OS X
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9781597499545
You might also like
book
OS X Exploits and Defense
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had …
book
MAC OS® X UNIX® Toolbox: 1000+ Commands for the Mac OS® X
Explore a ton of powerful Mac OS X UNIX commands This handy, compact guide teaches you …
book
Mac for Linux Geeks
Some might say we all want Linux with an OS X graphical user interface. Mac for …
book
Take Control of Securing Your Mac
Keep your Mac safe from intruders, malware, and more! Version 1.3.1, July 22, 2022 Secure your …