|
|
|
|
LEADER |
04675nmm a2200517 u 4500 |
001 |
EB001949614 |
003 |
EBX01000000000000001112516 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1283852268
|
020 |
|
|
|a 9781597499545
|
020 |
|
|
|a 1597499544
|
050 |
|
4 |
|a QA76.774.M33
|
100 |
1 |
|
|a Bathurst, Robert
|
245 |
0 |
0 |
|a The hacker's guide to OS X
|b exploiting OS X from the root-up
|c Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor
|
260 |
|
|
|a Waltham, MA
|b Syngress/Elsevier
|c 2013
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit
|
505 |
0 |
|
|a The File System ForefathersFile System Layouts; Hierarchical File System (circa 1985); Microsoft File Systems; HFS Plus; Journaled HFS; MetaData; Understanding Forks; Data Forks; Resource Forks; Named Forks; Fiddling with the File System; Playing with Attributes; Hidden Files; Conclusion; 4 Footprinting OSX; Introduction; Off the Client; On the Client; Conclusion; 5 Application and System Vulnerabilities; Introduction; Understanding Vulnerabilities; Vulnerabilities are Equal Opportunity; Media Layers; Host Layers; History of Vulnerabilities in Apple Products; Mac OS X Specific
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Using the Ammo in the WeaponMS08-067 "Old reliable"; Web Exploits; Physical Attacks; Data Gathering and Extraction; Summary; References; 8 Reverse Engineering; Introduction; The Basics; Coding; Decompiling Journey; CPU Registers; Memory Monster; Assembly Time; Ripping It Apart; Taking It Home; Analysis Techniques; Summary; References; 9 Mobile Platforms; Introduction; Apple iOS Security Model and Overview; Insecurity Overview; Jailbreakme.com; ROP and Jailbreakme.com; redsn0w; Charlie Miller and Nitro; Safari JavaScript Vulnerability; Remote Attack Scenario; The Goods
|
505 |
0 |
|
|a A Byte of HistoryPowerPC Architecture and Transition to Intel; Firmware-EFI; File System-HFS+; Common Misconceptions; Better for Designers/Creative People; Secure; Perceptions; Capabilities; Environments Leveraging OSX; Home; Business; Security; Virtualization; Mobile Expansion; Appstore; What Next?; 3 The Filesystem; Introduction; What is a File System?; The Difference Between Memory Types; Partition Tables; Identifying GUIDs; Booting; Master Boot Records; Blessed be Thy Volume; Booting from the Network; Working up to HFS+; How a File System Works; File System Addressing; Disk Fragmentation
|
505 |
0 |
|
|a Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?; What is Contained Within the Guide?; Chapter 1: The Introduction; Chapter 2: OS History; Chapter 3: The Filesystem; Chapter 4: Footprinting OSX; Chapter 5: Application and System Vulnerabilities; Chapter 6: Defensive Applications; Chapter 7: Offensive Tactics; Chapter 8: Reverse Engineering; Chapter 9: Mobile Platforms; Chapter 10: Tips, Tricks, and the Future; The Path Ahead; Reference; 2 History and Introduction to OSX; History and Introduction to OSX; OSX Origins
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Mac OS. / http://id.loc.gov/authorities/names/n96060065
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Systèmes d'exploitation (Ordinateurs)
|
653 |
|
|
|a Operating systems (Computers) / http://id.loc.gov/authorities/subjects/sh85094982
|
653 |
|
|
|a Apple computer / fast
|
653 |
|
|
|a operating systems / aat
|
653 |
|
|
|a Mac OS / fast
|
653 |
|
|
|a Mac OS. / blmlsh
|
653 |
|
|
|a Operating systems (Computers) / fast
|
653 |
|
|
|a Apple (Ordinateurs)
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a Apple computer / http://id.loc.gov/authorities/subjects/sh85006124
|
700 |
1 |
|
|a Rogers, Russ
|
700 |
1 |
|
|a Ghassemlouei, Alijohn
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 1597499501
|
776 |
|
|
|z 9781597499507
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597499507/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005/.8
|