LEADER 04675nmm a2200517 u 4500
001 EB001949614
003 EBX01000000000000001112516
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1283852268 
020 |a 9781597499545 
020 |a 1597499544 
050 4 |a QA76.774.M33 
100 1 |a Bathurst, Robert 
245 0 0 |a The hacker's guide to OS X  |b exploiting OS X from the root-up  |c Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor 
260 |a Waltham, MA  |b Syngress/Elsevier  |c 2013 
300 |a 1 volume  |b illustrations 
505 0 |a A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit 
505 0 |a The File System ForefathersFile System Layouts; Hierarchical File System (circa 1985); Microsoft File Systems; HFS Plus; Journaled HFS; MetaData; Understanding Forks; Data Forks; Resource Forks; Named Forks; Fiddling with the File System; Playing with Attributes; Hidden Files; Conclusion; 4 Footprinting OSX; Introduction; Off the Client; On the Client; Conclusion; 5 Application and System Vulnerabilities; Introduction; Understanding Vulnerabilities; Vulnerabilities are Equal Opportunity; Media Layers; Host Layers; History of Vulnerabilities in Apple Products; Mac OS X Specific 
505 0 |a Includes bibliographical references and index 
505 0 |a Using the Ammo in the WeaponMS08-067 "Old reliable"; Web Exploits; Physical Attacks; Data Gathering and Extraction; Summary; References; 8 Reverse Engineering; Introduction; The Basics; Coding; Decompiling Journey; CPU Registers; Memory Monster; Assembly Time; Ripping It Apart; Taking It Home; Analysis Techniques; Summary; References; 9 Mobile Platforms; Introduction; Apple iOS Security Model and Overview; Insecurity Overview; Jailbreakme.com; ROP and Jailbreakme.com; redsn0w; Charlie Miller and Nitro; Safari JavaScript Vulnerability; Remote Attack Scenario; The Goods 
505 0 |a A Byte of HistoryPowerPC Architecture and Transition to Intel; Firmware-EFI; File System-HFS+; Common Misconceptions; Better for Designers/Creative People; Secure; Perceptions; Capabilities; Environments Leveraging OSX; Home; Business; Security; Virtualization; Mobile Expansion; Appstore; What Next?; 3 The Filesystem; Introduction; What is a File System?; The Difference Between Memory Types; Partition Tables; Identifying GUIDs; Booting; Master Boot Records; Blessed be Thy Volume; Booting from the Network; Working up to HFS+; How a File System Works; File System Addressing; Disk Fragmentation 
505 0 |a Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?; What is Contained Within the Guide?; Chapter 1: The Introduction; Chapter 2: OS History; Chapter 3: The Filesystem; Chapter 4: Footprinting OSX; Chapter 5: Application and System Vulnerabilities; Chapter 6: Defensive Applications; Chapter 7: Offensive Tactics; Chapter 8: Reverse Engineering; Chapter 9: Mobile Platforms; Chapter 10: Tips, Tricks, and the Future; The Path Ahead; Reference; 2 History and Introduction to OSX; History and Introduction to OSX; OSX Origins 
653 |a Computer security 
653 |a Mac OS. / http://id.loc.gov/authorities/names/n96060065 
653 |a Sécurité informatique 
653 |a Systèmes d'exploitation (Ordinateurs) 
653 |a Operating systems (Computers) / http://id.loc.gov/authorities/subjects/sh85094982 
653 |a Apple computer / fast 
653 |a operating systems / aat 
653 |a Mac OS / fast 
653 |a Mac OS. / blmlsh 
653 |a Operating systems (Computers) / fast 
653 |a Apple (Ordinateurs) 
653 |a Computer security / fast 
653 |a Computer Security 
653 |a Apple computer / http://id.loc.gov/authorities/subjects/sh85006124 
700 1 |a Rogers, Russ 
700 1 |a Ghassemlouei, Alijohn 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 1597499501 
776 |z 9781597499507 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499507/?ar  |x Verlag  |3 Volltext 
082 0 |a 005/.8