Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Forward
Chapter 1. Introduction
Why You are Reading This Book?
The Path Ahead
Reference
Chapter 2. History and Introduction to OSX
History and Introduction to OSX
Chapter 3. The Filesystem
Introduction
What is a File System?
The Difference Between Memory Types
Partition Tables
Identifying GUIDs
Booting
Master Boot Records
Blessed be Thy Volume
Booting from the Network
Working up to HFS+
How a File System Works
File System Addressing
Disk Fragmentation
The File System Forefathers
File System Layouts
Hierarchical File System (circa 1985)
Microsoft File Systems
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files
Conclusion
Chapter 4. Footprinting OSX
Introduction
Off the Client
On the Client
Conclusion
Chapter 5. Application and System Vulnerabilities
Introduction
Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
Media Layers
Host Layers
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
How it Works
Understanding Apple’s Security Response
Apple iOS Specific
Keeping it Under Control
Advanced Persistent Threats
Apple Script
Conclusion
Chapter 6. Defensive Applications
Introduction
Secure Configurations
Kernel Extension Removal
Examining Commercial Tools
Conclusion
Chapter 7. Offensive Tactics
Introduction
Summary
References
Chapter 8. Reverse Engineering
Introduction
The Basics
Coding
Decompiling Journey
Memory Monster
Assembly Time
Ripping It Apart
Taking It Home
Analysis Techniques
Summary
References
Chapter 9. Mobile Platforms
Introduction
Apple iOS Security Model and Overview
References
Chapter 10. Mac OS X Tips and Tricks
Introduction
Web Browser Plugins
Cool OS X Hacks
Conclusion
Index
← Prev
Back
Next →
← Prev
Back
Next →