
The Hacker's Guide to OS X
Exploiting OS X from the Root Up
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
The Hacker's Guide to OS X
Exploiting OS X from the Root Up
About this book
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackersAs a resource to the reader, the companion website will provide links from the authors, commentary and updates.- Provides relevant information including some of the latest OS X threats- Easily accessible to those without any prior OS X experience- Useful tips and strategies for exploiting and compromising OS X systems- Includes discussion of defensive and countermeasure applications and how to use them- Covers mobile IOS vulnerabilities
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1
Introduction
Information in this chapter:



Why You are Reading This Book?
What is Contained Within the Guide?
Chapter 1: The Introduction
Chapter 2: OS History
Chapter 3: The Filesystem
Chapter 4: Footprinting OSX
Chapter 5: Application and System Vulnerabilities
Chapter 6: Defensive Applications
Chapter 7: Offensive Tactics
Chapter 8: Reverse Engineering
Chapter 9: Mobile Platforms
Chapter 10: Tips, Tricks, and the Future
The Path Ahead
Reference
Chapter 2
History and Introduction to OSX
History and Introduction to OSX
OSX Origins
A Byte of History
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Forward
- Chapter 1. Introduction
- Chapter 2. History and Introduction to OSX
- Chapter 3. The Filesystem
- Chapter 4. Footprinting OSX
- Chapter 5. Application and System Vulnerabilities
- Chapter 6. Defensive Applications
- Chapter 7. Offensive Tactics
- Chapter 8. Reverse Engineering
- Chapter 9. Mobile Platforms
- Chapter 10. Mac OS X Tips and Tricks
- Index