Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 20 von 23

Details

Autor(en) / Beteiligte
Titel
The hacker's guide to OS X : exploiting OS X from the root up [electronic resource]
Auflage
1st edition
Link zum Volltext
Beschreibungen/Notizen
  • Description based upon print version of record.
  • Includes bibliographical references and index.
  • Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?; What is Contained Within the Guide?; Chapter 1: The Introduction; Chapter 2: OS History; Chapter 3: The Filesystem; Chapter 4: Footprinting OSX; Chapter 5: Application and System Vulnerabilities; Chapter 6: Defensive Applications; Chapter 7: Offensive Tactics; Chapter 8: Reverse Engineering; Chapter 9: Mobile Platforms; Chapter 10: Tips, Tricks, and the Future; The Path Ahead; Reference; 2 History and Introduction to OSX; History and Introduction to OSX; OSX Origins
  • A Byte of HistoryPowerPC Architecture and Transition to Intel; Firmware-EFI; File System-HFS+; Common Misconceptions; Better for Designers/Creative People; Secure; Perceptions; Capabilities; Environments Leveraging OSX; Home; Business; Security; Virtualization; Mobile Expansion; Appstore; What Next?; 3 The Filesystem; Introduction; What is a File System?; The Difference Between Memory Types; Partition Tables; Identifying GUIDs; Booting; Master Boot Records; Blessed be Thy Volume; Booting from the Network; Working up to HFS+; How a File System Works; File System Addressing; Disk Fragmentation
  • The File System ForefathersFile System Layouts; Hierarchical File System (circa 1985); Microsoft File Systems; HFS Plus; Journaled HFS; MetaData; Understanding Forks; Data Forks; Resource Forks; Named Forks; Fiddling with the File System; Playing with Attributes; Hidden Files; Conclusion; 4 Footprinting OSX; Introduction; Off the Client; On the Client; Conclusion; 5 Application and System Vulnerabilities; Introduction; Understanding Vulnerabilities; Vulnerabilities are Equal Opportunity; Media Layers; Host Layers; History of Vulnerabilities in Apple Products; Mac OS X Specific
  • A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit
  • Using the Ammo in the WeaponMS08-067 "Old reliable"; Web Exploits; Physical Attacks; Data Gathering and Extraction; Summary; References; 8 Reverse Engineering; Introduction; The Basics; Coding; Decompiling Journey; CPU Registers; Memory Monster; Assembly Time; Ripping It Apart; Taking It Home; Analysis Techniques; Summary; References; 9 Mobile Platforms; Introduction; Apple iOS Security Model and Overview; Insecurity Overview; Jailbreakme.com; ROP and Jailbreakme.com; redsn0w; Charlie Miller and Nitro; Safari JavaScript Vulnerability; Remote Attack Scenario; The Goods
  • Please Don't Hurt My Toys
  • Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
  • English
Sprache
Englisch
Identifikatoren
ISBN: 1-283-85226-8, 1-59749-954-4
OCLC-Nummer: 819635625
Titel-ID: 9925023219706463
Format
1 online resource (249 p.)
Schlagworte
Operating systems (Computers)