
The Hacker's Guide to OS X
Exploiting OS X from the Root Up
- 1st Edition - November 16, 2012
- Authors: Alijohn Ghassemlouei, Robert Bathurst, Russ Rogers
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 9 5 0 - 7
- eBook ISBN:9 7 8 - 1 - 5 9 7 4 9 - 9 5 4 - 5
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application po… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteWritten by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
- Provides relevant information including some of the latest OS X threats
- Easily accessible to those without any prior OS X experience
- Useful tips and strategies for exploiting and compromising OS X systems
- Includes discussion of defensive and countermeasure applications and how to use them
- Covers mobile IOS vulnerabilities
Security Professionals (Security Auditors, Security Engineers,), Cyber security professionals, hackers, programmers focused on secure coding, and reverse engineers
Forward
Chapter 1. Introduction
Why You are Reading This Book?
The Path Ahead
Reference
Chapter 2. History and Introduction to OSX
History and Introduction to OSX
Chapter 3. The Filesystem
Introduction
What is a File System?
The Difference Between Memory Types
Partition Tables
Identifying GUIDs
Booting
Master Boot Records
Blessed be Thy Volume
Booting from the Network
Working up to HFS+
How a File System Works
File System Addressing
Disk Fragmentation
The File System Forefathers
File System Layouts
Hierarchical File System (circa 1985)
Microsoft File Systems
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files
Conclusion
Chapter 4. Footprinting OSX
Introduction
Off the Client
On the Client
Conclusion
Chapter 5. Application and System Vulnerabilities
Introduction
Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
Media Layers
Host Layers
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
How it Works
Understanding Apple’s Security Response
Apple iOS Specific
Keeping it Under Control
Advanced Persistent Threats
Apple Script
Conclusion
Chapter 6. Defensive Applications
Introduction
Secure Configurations
Kernel Extension Removal
Examining Commercial Tools
Conclusion
Chapter 7. Offensive Tactics
Introduction
Summary
References
Chapter 8. Reverse Engineering
Introduction
The Basics
Coding
Decompiling Journey
Memory Monster
Assembly Time
Ripping It Apart
Taking It Home
Analysis Techniques
Summary
References
Chapter 9. Mobile Platforms
Introduction
Apple iOS Security Model and Overview
References
Chapter 10. Mac OS X Tips and Tricks
Introduction
Web Browser Plugins
Cool OS X Hacks
Conclusion
Index
- No. of pages: 248
- Language: English
- Edition: 1
- Published: November 16, 2012
- Imprint: Syngress
- Paperback ISBN: 9781597499507
- eBook ISBN: 9781597499545
AG
Alijohn Ghassemlouei
RB
Robert Bathurst
RR