AI & BIG DATA
Shaping today's innovations
Save up to 25% on AI & Big Data books, eBooks & Journals

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application po… Read more
AI & BIG DATA
Save up to 25% on AI & Big Data books, eBooks & Journals
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
Security Professionals (Security Auditors, Security Engineers,), Cyber security professionals, hackers, programmers focused on secure coding, and reverse engineers
Forward
Chapter 1. Introduction
Why You are Reading This Book?
The Path Ahead
Reference
Chapter 2. History and Introduction to OSX
History and Introduction to OSX
Chapter 3. The Filesystem
Introduction
What is a File System?
The Difference Between Memory Types
Partition Tables
Identifying GUIDs
Booting
Master Boot Records
Blessed be Thy Volume
Booting from the Network
Working up to HFS+
How a File System Works
File System Addressing
Disk Fragmentation
The File System Forefathers
File System Layouts
Hierarchical File System (circa 1985)
Microsoft File Systems
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files
Conclusion
Chapter 4. Footprinting OSX
Introduction
Off the Client
On the Client
Conclusion
Chapter 5. Application and System Vulnerabilities
Introduction
Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
Media Layers
Host Layers
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
How it Works
Understanding Apple’s Security Response
Apple iOS Specific
Keeping it Under Control
Advanced Persistent Threats
Apple Script
Conclusion
Chapter 6. Defensive Applications
Introduction
Secure Configurations
Kernel Extension Removal
Examining Commercial Tools
Conclusion
Chapter 7. Offensive Tactics
Introduction
Summary
References
Chapter 8. Reverse Engineering
Introduction
The Basics
Coding
Decompiling Journey
Memory Monster
Assembly Time
Ripping It Apart
Taking It Home
Analysis Techniques
Summary
References
Chapter 9. Mobile Platforms
Introduction
Apple iOS Security Model and Overview
References
Chapter 10. Mac OS X Tips and Tricks
Introduction
Web Browser Plugins
Cool OS X Hacks
Conclusion
Index
AG
RB
RR