Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

The Hacker's Guide to OS X: Exploiting OS X from the Root Up

Компьютерные >> Операционные системы





Разместил: bennyblanko

7-11-2014, 11:30

Просмотров: 354





The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. As a resource to the reader, the companion website will provide links from the authors, commentary and updates. It provides relevant information including some of the latest OS X threats. It is easily accessible to those without any prior OS X experience. It includes useful tips and strategies for exploiting and compromising OS X systems. It includes discussion of defensive and countermeasure applications and how to use them. It covers mobile IOS vulnerabilities.


Contents

Introduction

Why You are Reading This Book?
What is Contained Within the Guide?
The Path Ahead

History and Introduction to OSX

History and Introduction to OSX
OSX Origins
Common Misconceptions
Perceptions
Capabilities
Environments Leveraging OSX
What Next?

The Filesystem

What is a File System?
The Difference Between Memory Types
Partition Tables
Booting
Working up to HFS+
How a File System Works
Disk Fragmentation
The File System Forefathers
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files

Footprinting OSX

Off the Client
On the Client

Application and System Vulnerabilities

Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
Apple iOS Specific
Advanced Persistent Threats
Apple Script

Defensive Applications

Secure Configurations
Passwords, Passphrases, and Multi-Factor Authentication
Account Access Restriction
FileVault
Firewall Configuration
Network Services
Kernel Extension Removal
Examining Commercial Tools
PrivacyScan by SecureMac
MacScan by SecureMac

Offensive Tactics

The Exploits
Using the Ammo in the Weapon

Reverse Engineering

The Basics
Coding
Decompiling Journey
Analysis Techniques

Mobile Platforms

Apple iOS Security Model and Overview
Insecurity Overview
The Goods
Please Don’t Hurt My Toys

Mac OS X Tips and Tricks

Web Browser Plugins
Offensive Plugins
Defensive Plugins
Cool OS X hacks
Safari Debug Mode
Total Mac OS X Inversion
More on ACP Applications


Название: The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Автор: Bathurst R., Rogers R., Ghassemlouei A.
Издательство: Elsevier
Год: 2013
ISBN: 1597499501
Количество страниц: 248
Формат: PDF
Язык: русский
Размер: 19.8 Мб


СКАЧАТЬ

turbobit.net
dfiles.ru








Похожие публикации

Fundamentals of Information Systems Security Fundamentals of Information Systems Security
Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in

Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

Attack and Defend Computer Security Set Attack and Defend Computer Security Set
Web Application Hacker's Handbook 2e. There have been two broad trends that have evolved since the first edition and will be covered in detail in this edition: Various new and modified technologies have appeared that are being used in web

Android Hacker's Handbook Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank

MIMO Wireless Communications MIMO Wireless Communications
Multiple-input multiple-output (MIMO) technology constitutes a breakthrough in the design of wireless communications systems, and is already at the core of several wireless standards. Exploiting multipath scattering, MIMO techniques deliver

Complete Krav Maga: The Ultimate Guide to Over 230 Self-Defense and Combative Techniques Complete Krav Maga: The Ultimate Guide to Over 230 Self-Defense and Combative Techniques
The official self-defense system of the Israeli Defense Forces, Krav Maga offers you an easy-to-learn yet highly effective self-defense system that emphasizes instinctive movements, practical techniques and realistic training scenarios. Based on the

The War Within Us: Everyman's Guide to Infection and Immunity The War Within Us: Everyman's Guide to Infection and Immunity
Infectious diseases are the leading cause of death worldwide. In The War Within Us, well-known author and infectious disease specialist Cedric Mims makes the intricacies of the immune system and infectious diseases less baffling for the general

Google Hacking for Penetration Testers Google Hacking for Penetration Testers
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice

Hacking Exposed Wireless, 2 Edition Hacking Exposed Wireless, 2 Edition
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition

Understanding the Network. A practical guide to Internetworking Understanding the Network. A practical guide to Internetworking
If you are reading this, I am sure that you are already aware that this book is about networking. To be more specific, it describes the various technologies and techniques needed to design, build, and manage a multiprotocol local or wide area




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов