What is included with this book?
Foreword | p. ix |
Introduction | p. 1 |
Why You are Reading This Book? | p. 1 |
What is Contained Within the Guide? | p. 2 |
The Path Ahead | p. 4 |
References | p. 4 |
History and Introduction to OSX | p. 5 |
History and Introduction to OSX | p. 5 |
OSX Origins | p. 5 |
Common Misconceptions | p. 9 |
Perceptions | p. 11 |
Capabilities | p. 11 |
Environments Leveraging OSX | p. 12 |
What Next? | p. 16 |
The Filesystem | p. 17 |
Introduction | p. 17 |
What is a File System? | p. 17 |
The Difference Between Memory Types | p. 18 |
Partition Tables | p. 19 |
Booting | p. 22 |
Working up to HFS+ | p. 24 |
How a File System Works | p. 25 |
Disk Fragmentation | p. 27 |
The File System Forefathers | p. 28 |
HFS Plus | p. 34 |
Journaled HFS | p. 35 |
MetaData | p. 36 |
Understanding Forks | p. 38 |
Fiddling with the File System | p. 41 |
Playing with Attributes | p. 41 |
Hidden Files | p. 43 |
Conclusion | p. 46 |
Footprinting OSX | p. 49 |
Introduction | p. 49 |
Off the Client | p. 50 |
On the Client | p. 69 |
Conclusion | p. 77 |
Application and System Vulnerabilities | p. 79 |
Introduction | p. 79 |
Understanding Vulnerabilities | p. 79 |
Vulnerabilities are Equal Opportunity | p. 83 |
History of Vulnerabilities in Apple Products | p. 85 |
Mac OS X Specific | p. 86 |
A Recent Example-Flashback | p. 88 |
Apple iOS Specific | p. 91 |
Advanced Persistent Threats | p. 94 |
Apple Script | p. 95 |
Conclusion | p. 100 |
Defensive Applications | p. 101 |
Introduction | p. 101 |
Secure Configurations | p. 102 |
Passwords, Passphrases, and Multi-Factor Authentication | p. 102 |
Account Access Restriction | p. 103 |
FileVault | p. 106 |
Firewall Configuration | p. 108 |
Network Services | p. 111 |
Kernel Extension Removal | p. 114 |
Examining Commercial Tools | p. 117 |
PrivacyScan by SecureMac | p. 117 |
MacScan by SecureMac | p. 124 |
Conclusion | p. 135 |
Offensive Tactics | p. 137 |
Introduction | p. 137 |
The Exploits | p. 139 |
Using the Ammo in the Weapon | p. 143 |
Summary | p. 156 |
References | p. 157 |
Reverse Engineering | p. 159 |
Introduction | p. 159 |
The Basics | p. 160 |
Coding | p. 161 |
Decompiling Journey | p. 166 |
Analysis Techniques | p. 182 |
References | p. 183 |
Mobile Platforms | p. 185 |
Introduction | p. 185 |
Apple iOS Security Model and Overview | p. 186 |
Insecurity Overview | p. 189 |
The Goods | p. 198 |
Please Don't Hurt My Toys | p. 203 |
Summary | p. 204 |
References | p. 205 |
Mac OS X Tips and Tricks | p. 207 |
Introduction | p. 207 |
Web Browser Plugins | p. 207 |
Offensive Plugins | p. 208 |
Defensive Plugins | p. 219 |
Cool OS X hacks | p. 223 |
Safari Debug Mode | p. 223 |
Total Mac OS X Inversion | p. 224 |
More on ACP Applications | p. 225 |
Conclusion | p. 228 |
Index | p. 229 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.