Freshly Printed - allow 10 days lead
The Hacker's Guide to OS X
Exploiting OS X from the Root Up
Mac OS X is becoming increasingly more prevalent. Read this book to find out how to exploit, compromise, utilize, and leverage it
Alijohn Ghassemlouei (Author), Robert Bathurst (Author), Russ Rogers (Author)
9781597499507, Elsevier Science
Paperback / softback, published 7 December 2012
248 pages
23.5 x 19 x 1.7 cm, 0.41 kg
"Authors Robert Bathurst, Russ Rogers and Alijohn Ghassemlouei detail the fundamentals of the OS X environment and its many vulnerabilities…The book is a like a slimmed-down version of Hacking Exposed for the Mac…in that it both shows how to attack the operating system, in addition to detailing defensive measures to stop attackers." --RSAConference.com, March 2013
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
1. Introduction 2. Pre carbon 3. Post carbon 4. Filesystem 5. Footprint 6. Application and System Vulnerabilities 7. Defensive Applications 8. Offensive Tactics 9. Reverse Engineering 10. Mobile Platforms 11. Awesome Tips
Subject Areas: Computer security [UR], Operating systems [UL]