Купить бумажную книгу и читать
По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".
Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.
Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.
Название: The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Автор: Bathurst R., Rogers R., Ghassemlouei A.
Издательство: Elsevier
Год: 2013
ISBN: 1597499501
Количество страниц: 248
Формат: PDF
Язык: english
Размер: 19.8 Мб
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. As a resource to the reader, the companion website will provide links from the authors, commentary and updates. It provides relevant information including some of the latest OS X threats. It is easily accessible to those without any prior OS X experience. It includes useful tips and strategies for exploiting and compromising OS X systems. It includes discussion of defensive and countermeasure applications and how to use them. It covers mobile IOS vulnerabilities.
Contents
Introduction
Why You are Reading This Book?
What is Contained Within the Guide?
The Path Ahead
History and Introduction to OSX
History and Introduction to OSX
OSX Origins
Common Misconceptions
Perceptions
Capabilities
Environments Leveraging OSX
What Next?
The Filesystem
What is a File System?
The Difference Between Memory Types
Partition Tables
Booting
Working up to HFS+
How a File System Works
Disk Fragmentation
The File System Forefathers
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files
Footprinting OSX
Off the Client
On the Client
Application and System Vulnerabilities
Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
Apple iOS Specific
Advanced Persistent Threats
Apple Script
Defensive Applications
Secure Configurations
Passwords, Passphrases, and Multi-Factor Authentication
Account Access Restriction
FileVault
Firewall Configuration
Network Services
Kernel Extension Removal
Examining Commercial Tools
PrivacyScan by SecureMac
MacScan by SecureMac
Offensive Tactics
The Exploits
Using the Ammo in the Weapon
Reverse Engineering
The Basics
Coding
Decompiling Journey
Analysis Techniques
Mobile Platforms
Apple iOS Security Model and Overview
Insecurity Overview
The Goods
Please Don’t Hurt My Toys
Mac OS X Tips and Tricks
Web Browser Plugins
Offensive Plugins
Defensive Plugins
Cool OS X hacks
Safari Debug Mode
Total Mac OS X Inversion
More on ACP Applications
СКАЧАТЬ
Купить бумажную книгу или электронную версию книги и скачать
По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".
Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.
Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.
Дата создания страницы: