Text
The hacker's guide to OS X: exploiting OS X from the root up
Table of Contents
Chapter 1. Introduction
Why You are Reading This Book?
The Path Ahead
Chapter 2. History and Introduction to OSX
History and Introduction to OSX
Chapter 3. The Filesystem
Introduction
What is a File System?
The Difference Between Memory Types
Partition Tables
Identifying GUIDs
Booting
Master Boot Records
Blessed be Thy Volume
Booting from the Network
Working up to HFS+
How a File System Works
File System Addressing
Disk Fragmentation
The File System Forefathers
File System Layouts
Hierarchical File System (circa 1985)
Microsoft File Systems
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files
Chapter 4. Footprinting OSX
Introduction
Off the Client
On the Client
Conclusion
Chapter 5. Application and System Vulnerabilities
Introduction
Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
Media Layers
Host Layers
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
How it Works
Understanding Apple’s Security Response
Apple iOS Specific
Keeping it Under Control
Advanced Persistent Threats
Apple Script
Chapter 6. Defensive Applications
Introduction
Secure Configurations
Kernel Extension Removal
Examining Commercial Tools
Chapter 7. Offensive Tactics
Introduction
Summary
References
Chapter 8. Reverse Engineering
Introduction
The Basics
Coding
Decompiling Journey
Memory Monster
Assembly Time
Ripping It Apart
Taking It Home
Analysis Techniques
Chapter 9. Mobile Platforms
Introduction
Apple iOS Security Model and Overview
References
Chapter 10. Mac OS X Tips and Tricks
Introduction
Web Browser Plugins
Cool OS X Hacks
Conclusion
No other version available