did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781597499507

The Hacker's Guide to OS X

by ; ;
  • ISBN13:

    9781597499507

  • ISBN10:

    1597499501

  • Format: Paperback
  • Copyright: 2012-11-16
  • Publisher: Syngress Media Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.95
  • Digital
    $56.19
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. *Provides relevant information including some of the latest OS X threats *Easily accessible to those without any prior OS X experience *Useful tips and strategies for exploiting and compromising OS X systems *Includes discussion of defensive and countermeasure applications and how to use them *Covers mobile IOS vulnerabilities

Author Biography

Despite what is commonly believed, there has never been any shortage of MAC OS-related security issues. Mac OS 10 has security issues that warrant attention, and threats to the OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-Compromise concealment, or distributed denial of, service, knowing why a system is vulnerable and understanding how to defend it is critical to computer security. Written by three experienced penetration testers, the material presented discusses the basics of the OS X environment and its vulnerabilities. This book provides a comprehensible yet in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. Provides relevant information including some of the latest OS X threats Easily accessible to those without any prior OS X experience Useful tips and strategies for exploiting and compromising OS X systems Includes discussion of defensive and countermeasure applications and how to use them Covers mobile iOS vulnerabilities. Rob Bathurst s currently a cyber security researcher and penetration tester focusing on reverse engineering. He has spent over a decade doing vulnerability assessment, programming, and network engineering for the Government, military, and private industry. Russ Rogers, OSSR CISM, IAM, IEM, Hon. Sc.D., is author of the popular Hacking a Terror Network: The Silent Threat of Covert Channels, and former editor-in-chief of The Security Journal. Russ is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc. Alijohn Ghassemlouei is a Cyber Security Specialist and Certified Ethical Hacker. In his current position he administers Linux/Unix/Os system in a penetration testing lab, and performs penetration testing attacking a diverse range of classified and unclassified hosts and operating systems.

Table of Contents

Forewordp. ix
Introductionp. 1
Why You are Reading This Book?p. 1
What is Contained Within the Guide?p. 2
The Path Aheadp. 4
Referencesp. 4
History and Introduction to OSXp. 5
History and Introduction to OSXp. 5
OSX Originsp. 5
Common Misconceptionsp. 9
Perceptionsp. 11
Capabilitiesp. 11
Environments Leveraging OSXp. 12
What Next?p. 16
The Filesystemp. 17
Introductionp. 17
What is a File System?p. 17
The Difference Between Memory Typesp. 18
Partition Tablesp. 19
Bootingp. 22
Working up to HFS+p. 24
How a File System Worksp. 25
Disk Fragmentationp. 27
The File System Forefathersp. 28
HFS Plusp. 34
Journaled HFSp. 35
MetaDatap. 36
Understanding Forksp. 38
Fiddling with the File Systemp. 41
Playing with Attributesp. 41
Hidden Filesp. 43
Conclusionp. 46
Footprinting OSXp. 49
Introductionp. 49
Off the Clientp. 50
On the Clientp. 69
Conclusionp. 77
Application and System Vulnerabilitiesp. 79
Introductionp. 79
Understanding Vulnerabilitiesp. 79
Vulnerabilities are Equal Opportunityp. 83
History of Vulnerabilities in Apple Productsp. 85
Mac OS X Specificp. 86
A Recent Example-Flashbackp. 88
Apple iOS Specificp. 91
Advanced Persistent Threatsp. 94
Apple Scriptp. 95
Conclusionp. 100
Defensive Applicationsp. 101
Introductionp. 101
Secure Configurationsp. 102
Passwords, Passphrases, and Multi-Factor Authenticationp. 102
Account Access Restrictionp. 103
FileVaultp. 106
Firewall Configurationp. 108
Network Servicesp. 111
Kernel Extension Removalp. 114
Examining Commercial Toolsp. 117
PrivacyScan by SecureMacp. 117
MacScan by SecureMacp. 124
Conclusionp. 135
Offensive Tacticsp. 137
Introductionp. 137
The Exploitsp. 139
Using the Ammo in the Weaponp. 143
Summaryp. 156
Referencesp. 157
Reverse Engineeringp. 159
Introductionp. 159
The Basicsp. 160
Codingp. 161
Decompiling Journeyp. 166
Analysis Techniquesp. 182
Referencesp. 183
Mobile Platformsp. 185
Introductionp. 185
Apple iOS Security Model and Overviewp. 186
Insecurity Overviewp. 189
The Goodsp. 198
Please Don't Hurt My Toysp. 203
Summaryp. 204
Referencesp. 205
Mac OS X Tips and Tricksp. 207
Introductionp. 207
Web Browser Pluginsp. 207
Offensive Pluginsp. 208
Defensive Pluginsp. 219
Cool OS X hacksp. 223
Safari Debug Modep. 223
Total Mac OS X Inversionp. 224
More on ACP Applicationsp. 225
Conclusionp. 228
Indexp. 229
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program