What is included with this book?
Foreword | p. ix |
Introduction | p. 1 |
Why You are Reading This Book? | p. 1 |
What is Contained Within the Guide? | p. 2 |
The Path Ahead | p. 4 |
References | p. 4 |
History and Introduction to OSX | p. 5 |
History and Introduction to OSX | p. 5 |
OSX Origins | p. 5 |
Common Misconceptions | p. 9 |
Perceptions | p. 11 |
Capabilities | p. 11 |
Environments Leveraging OSX | p. 12 |
What Next? | p. 16 |
The Filesystem | p. 17 |
Introduction | p. 17 |
What is a File System? | p. 17 |
The Difference Between Memory Types | p. 18 |
Partition Tables | p. 19 |
Booting | p. 22 |
Working up to HFS+ | p. 24 |
How a File System Works | p. 25 |
Disk Fragmentation | p. 27 |
The File System Forefathers | p. 28 |
HFS Plus | p. 34 |
Journaled HFS | p. 35 |
MetaData | p. 36 |
Understanding Forks | p. 38 |
Fiddling with the File System | p. 41 |
Playing with Attributes | p. 41 |
Hidden Files | p. 43 |
Conclusion | p. 46 |
Footprinting OSX | p. 49 |
Introduction | p. 49 |
Off the Client | p. 50 |
On the Client | p. 69 |
Conclusion | p. 77 |
Application and System Vulnerabilities | p. 79 |
Introduction | p. 79 |
Understanding Vulnerabilities | p. 79 |
Vulnerabilities are Equal Opportunity | p. 83 |
History of Vulnerabilities in Apple Products | p. 85 |
Mac OS X Specific | p. 86 |
A Recent Example-Flashback | p. 88 |
Apple iOS Specific | p. 91 |
Advanced Persistent Threats | p. 94 |
Apple Script | p. 95 |
Conclusion | p. 100 |
Defensive Applications | p. 101 |
Introduction | p. 101 |
Secure Configurations | p. 102 |
Passwords, Passphrases, and Multi-Factor Authentication | p. 102 |
Account Access Restriction | p. 103 |
FileVault | p. 106 |
Firewall Configuration | p. 108 |
Network Services | p. 111 |
Kernel Extension Removal | p. 114 |
Examining Commercial Tools | p. 117 |
PrivacyScan by SecureMac | p. 117 |
MacScan by SecureMac | p. 124 |
Conclusion | p. 135 |
Offensive Tactics | p. 137 |
Introduction | p. 137 |
The Exploits | p. 139 |
Using the Ammo in the Weapon | p. 143 |
Summary | p. 156 |
References | p. 157 |
Reverse Engineering | p. 159 |
Introduction | p. 159 |
The Basics | p. 160 |
Coding | p. 161 |
Decompiling Journey | p. 166 |
Analysis Techniques | p. 182 |
References | p. 183 |
Mobile Platforms | p. 185 |
Introduction | p. 185 |
Apple iOS Security Model and Overview | p. 186 |
Insecurity Overview | p. 189 |
The Goods | p. 198 |
Please Don't Hurt My Toys | p. 203 |
Summary | p. 204 |
References | p. 205 |
Mac OS X Tips and Tricks | p. 207 |
Introduction | p. 207 |
Web Browser Plugins | p. 207 |
Offensive Plugins | p. 208 |
Defensive Plugins | p. 219 |
Cool OS X hacks | p. 223 |
Safari Debug Mode | p. 223 |
Total Mac OS X Inversion | p. 224 |
More on ACP Applications | p. 225 |
Conclusion | p. 228 |
Index | p. 229 |
Table of Contents provided by Ingram. All Rights Reserved. |