The hacker's guide to OS X exploiting OS X from the root up

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a compr...

Full description

Bibliographic Details
Main Author: Bathurst, Robert
Other Authors: Rogers, Russ, Ghassemlouei, Alijohn
Format: eBook
Language:English
Published: Boston Syngress 2012, ©2013
Subjects:
Online Access:
Collection: Elsevier ScienceDirect eBooks - Collection details see MPG.ReNa
Description
Summary:Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities
Physical Description:online resource (x, 235 pages) illustrations
ISBN:9781597499507
1597499501