Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Forward Chapter 1. Introduction
Why You are Reading This Book? The Path Ahead Reference
Chapter 2. History and Introduction to OSX
History and Introduction to OSX
Chapter 3. The Filesystem
Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Booting from the Network Working up to HFS+ How a File System Works File System Addressing Disk Fragmentation The File System Forefathers File System Layouts Hierarchical File System (circa 1985) Microsoft File Systems HFS Plus Journaled HFS MetaData Understanding Forks Fiddling with the File System Playing with Attributes Hidden Files Conclusion
Chapter 4. Footprinting OSX
Introduction Off the Client On the Client Conclusion
Chapter 5. Application and System Vulnerabilities
Introduction Understanding Vulnerabilities Vulnerabilities are Equal Opportunity Media Layers Host Layers History of Vulnerabilities in Apple Products Mac OS X Specific A Recent Example—Flashback How it Works Understanding Apple’s Security Response Apple iOS Specific Keeping it Under Control Advanced Persistent Threats Apple Script Conclusion
Chapter 6. Defensive Applications
Introduction Secure Configurations Kernel Extension Removal Examining Commercial Tools Conclusion
Chapter 7. Offensive Tactics
Introduction Summary References
Chapter 8. Reverse Engineering
Introduction The Basics Coding Decompiling Journey Memory Monster Assembly Time Ripping It Apart Taking It Home Analysis Techniques Summary References
Chapter 9. Mobile Platforms
Introduction Apple iOS Security Model and Overview References
Chapter 10. Mac OS X Tips and Tricks
Introduction Web Browser Plugins Cool OS X Hacks Conclusion
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion