The Hacker's Guide To OS X Hackers Exploiting From Root Up 2013
User Manual:
Open the PDF directly: View PDF
Page Count: 249 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Front Cover
- Half Title
- The Hacker’s Guide to OS X
- Copyright
- Contents
- Foreword
- 1 Introduction
- Why You are Reading This Book?
- What is Contained Within the Guide?
- Chapter 1: The Introduction
- Chapter 2: OS History
- Chapter 3: The Filesystem
- Chapter 4: Footprinting OSX
- Chapter 5: Application and System Vulnerabilities
- Chapter 6: Defensive Applications
- Chapter 7: Offensive Tactics
- Chapter 8: Reverse Engineering
- Chapter 9: Mobile Platforms
- Chapter 10: Tips, Tricks, and the Future
- What is Contained Within the Guide?
- The Path Ahead
- Reference
- Why You are Reading This Book?
- 2 History and Introduction to OSX
- 3 The Filesystem
- Introduction
- What is a File System?
- The Difference Between Memory Types
- Partition Tables
- Identifying GUIDs
- Booting
- Master Boot Records
- Blessed be Thy Volume
- Booting from the Network
- Working up to HFS+
- How a File System Works
- File System Addressing
- Disk Fragmentation
- The File System Forefathers
- File System Layouts
- Hierarchical File System (circa 1985)
- Microsoft File Systems
- HFS Plus
- Journaled HFS
- MetaData
- Understanding Forks
- Fiddling with the File System
- Playing with Attributes
- Hidden Files
- Conclusion
- 4 Footprinting OSX
- 5 Application and System Vulnerabilities
- Introduction
- Understanding Vulnerabilities
- Vulnerabilities are Equal Opportunity
- Media Layers
- Host Layers
- History of Vulnerabilities in Apple Products
- Mac OS X Specific
- A Recent Example—Flashback
- How it Works
- Understanding Apple’s Security Response
- Apple iOS Specific
- Keeping it Under Control
- Advanced Persistent Threats
- Apple Script
- Conclusion
- 6 Defensive Applications
- 7 Offensive Tactics
- 8 Reverse Engineering
- 9 Mobile Platforms
- 10 Mac OS X Tips and Tricks
- Index