Cargando…

The hacker's guide to OS X : exploiting OS X from the root-up /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bathurst, Robert
Otros Autores: Rogers, Russ, Ghassemlouei, Alijohn
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress/Elsevier, ©2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn842439176
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 130510s2013 maua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d YDXCP  |d IDEBK  |d COO  |d DEBSZ  |d OCLCQ  |d CNSPO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA  |d CEF  |d TOF  |d AU@  |d UAB  |d UKAHL  |d C6I  |d VLY  |d VT2  |d REDDC  |d TUHNV  |d CZL  |d DST  |d OCLCO  |d OCL  |d OCLCQ 
019 |a 1103274041  |a 1162354943  |a 1229063242  |a 1243614209  |a 1295606081  |a 1300636692  |a 1303341803 
020 |a 9781597499545 
020 |a 1597499544 
020 |z 9781597499507 
020 |z 1597499501 
020 |a 1283852268 
020 |a 9781283852265 
029 1 |a DEBBG  |b BV041121667 
029 1 |a DEBSZ  |b 396765874 
035 |a (OCoLC)842439176  |z (OCoLC)1103274041  |z (OCoLC)1162354943  |z (OCoLC)1229063242  |z (OCoLC)1243614209  |z (OCoLC)1295606081  |z (OCoLC)1300636692  |z (OCoLC)1303341803 
037 |a CL0500000215  |b Safari Books Online 
050 4 |a QA76.774.M33  |b B38 2013 
082 0 4 |a 005/.8  |2 23 
049 |a UAMI 
100 1 |a Bathurst, Robert. 
245 1 4 |a The hacker's guide to OS X :  |b exploiting OS X from the root-up /  |c Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor. 
260 |a Waltham, MA :  |b Syngress/Elsevier,  |c ©2013. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?; What is Contained Within the Guide?; Chapter 1: The Introduction; Chapter 2: OS History; Chapter 3: The Filesystem; Chapter 4: Footprinting OSX; Chapter 5: Application and System Vulnerabilities; Chapter 6: Defensive Applications; Chapter 7: Offensive Tactics; Chapter 8: Reverse Engineering; Chapter 9: Mobile Platforms; Chapter 10: Tips, Tricks, and the Future; The Path Ahead; Reference; 2 History and Introduction to OSX; History and Introduction to OSX; OSX Origins. 
505 8 |a A Byte of HistoryPowerPC Architecture and Transition to Intel; Firmware-EFI; File System-HFS+; Common Misconceptions; Better for Designers/Creative People; Secure; Perceptions; Capabilities; Environments Leveraging OSX; Home; Business; Security; Virtualization; Mobile Expansion; Appstore; What Next?; 3 The Filesystem; Introduction; What is a File System?; The Difference Between Memory Types; Partition Tables; Identifying GUIDs; Booting; Master Boot Records; Blessed be Thy Volume; Booting from the Network; Working up to HFS+; How a File System Works; File System Addressing; Disk Fragmentation. 
505 8 |a The File System ForefathersFile System Layouts; Hierarchical File System (circa 1985); Microsoft File Systems; HFS Plus; Journaled HFS; MetaData; Understanding Forks; Data Forks; Resource Forks; Named Forks; Fiddling with the File System; Playing with Attributes; Hidden Files; Conclusion; 4 Footprinting OSX; Introduction; Off the Client; On the Client; Conclusion; 5 Application and System Vulnerabilities; Introduction; Understanding Vulnerabilities; Vulnerabilities are Equal Opportunity; Media Layers; Host Layers; History of Vulnerabilities in Apple Products; Mac OS X Specific. 
505 8 |a A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit. 
505 8 |a Using the Ammo in the WeaponMS08-067 "Old reliable"; Web Exploits; Physical Attacks; Data Gathering and Extraction; Summary; References; 8 Reverse Engineering; Introduction; The Basics; Coding; Decompiling Journey; CPU Registers; Memory Monster; Assembly Time; Ripping It Apart; Taking It Home; Analysis Techniques; Summary; References; 9 Mobile Platforms; Introduction; Apple iOS Security Model and Overview; Insecurity Overview; Jailbreakme.com; ROP and Jailbreakme.com; redsn0w; Charlie Miller and Nitro; Safari JavaScript Vulnerability; Remote Attack Scenario; The Goods. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Mac OS. 
630 0 7 |a Mac OS.  |2 blmlsh 
630 0 7 |a Mac OS.  |2 fast  |0 (OCoLC)fst01386304 
650 0 |a Apple computer. 
650 0 |a Computer security. 
650 0 |a Operating systems (Computers) 
650 2 |a Computer Security 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 6 |a Apple (Ordinateurs) 
650 6 |a Sécurité informatique. 
650 7 |a operating systems.  |2 aat 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
650 7 |a Apple computer.  |2 fast  |0 (OCoLC)fst00811612 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Rogers, Russ. 
700 1 |a Ghassemlouei, Alijohn. 
776 0 8 |i Print version:  |a Bathurst, Robert.  |t Hacker's guide to OS X.  |d Waltham, MA : Syngress/Elsevier, ©2013  |z 9781597499507  |w (DLC) 2012043002  |w (OCoLC)826899244 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499507/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24673642 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24345417 
938 |a YBP Library Services  |b YANK  |n 9926391 
994 |a 92  |b IZTAP