Os X Exploits and Defense : Own It... Just Like Windows or Linux!

by ; ; ; ;
Format: Paperback
Pub. Date: 2008-04-25
Publisher(s): Elsevier Science Ltd
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $70.30

Buy New

Arriving Soon. Will ship when available.
$66.95

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$75.54
$75.54

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities nad accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security. * Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software. * Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed! * Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley. * Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg * Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing. * WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network. * Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them. * Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are. * Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system * Reveals techniques by which OS X can be "owned" * Details procedures to defeat these techniques * Offers a sober look at emerging threats and trends

Table of Contents

Macintosh OS X Boot Process and Forensic Softwarep. 1
Introductionp. 2
The Boot Processp. 3
The Macintosh Boot Processp. 4
EFI and BIOS: Similar but Differentp. 4
DARWINp. 5
The OS X Kernelp. 5
Macintosh Forensic Softwarep. 6
BlackBag Forensic Suitep. 6
Directory Scanp. 7
FileSpyp. 8
HeaderBuilderp. 9
Other Toolsp. 10
Carbon Copy Clonerp. 11
MacDrive6/7p. 13
Summaryp. 16
Past and Current Threatsp. 17
Before the Floodp. 18
The 21st Century Threatscapep. 26
Apple Vulnerability/Update Retrospectivep. 27
Exploit Development and Researchp. 56
Malicious Macs: Malware and the Macp. 69
Introductionp. 70
Taxonomy of Malwarep. 72
Virusesp. 72
Wormsp. 73
Trojan Horsesp. 75
Rootkits and Stealthkitsp. 75
Bots and Botnetsp. 77
Memetic Malwarep. 78
Pre-OS X Mac Malwarep. 81
HyperCard Infectorsp. 81
Application and System Virusesp. 83
Trojansp. 86
Macro Malwarep. 88
Heterogeneous Malware Transmissionp. 91
Worms: AutoStart and Afterp. 92
OS X and Malwarep. 94
Case Study-OSX/DNSChangerp. 96
Self-launching vs. User-launchedp. 102
What Does That Mean?p. 103
Media Attitudesp. 103
Schadenfreude or Armageddon?p. 105
Is That It Then?p. 106
The Futurep. 108
Message to the User Communityp. 110
Message to Apple (and Microsoft!)p. 111
Watch and Learnp. 112
Summaryp. 113
Solutions Fast Trackp. 115
Frequently Asked Questionsp. 119
Malware Detection and the Macp. 121
Introductionp. 122
Safe Out of the Box?p. 123
Anti-malware Technologyp. 132
More About EICARp. 133
Classic Anti-malware Detection Techniquesp. 136
Signature Scanningp. 139
Heuristics Revealedp. 140
Anti-malware Productsp. 142
Anti-malware Before OS Xp. 143
Disinfectantp. 145
Anti-malware and OS Xp. 147
avast!p. 147
ClamAVp. 148
ClamXavp. 149
Intego VirusBarrierp. 151
MacScanp. 152
McAfee Virex/VirusScan for Macp. 152
Sophosp. 154
Symantecp. 155
Product Testingp. 157
Summaryp. 159
Solutions Fast Trackp. 159
Frequently Asked Questionsp. 162
Mac OS X for Pen Testersp. 163
Introductionp. 164
The OS X Command Shellp. 166
Compiling and Porting Open Source Softwarep. 169
OS X Developer Toolsp. 170
Perlp. 172
Configuring CPANp. 173
Using CPAN's Interactive Modep. 175
Using CPAN in Command-line Modep. 178
Installing XWindowsp. 178
Compiling Programs on Mac OS Xp. 180
Compiling Versus Portingp. 180
Installing Ported Software on Mac OS Xp. 181
Why Port: A Source Install Gone Bad!p. 181
OpenDarwinp. 183
Finkp. 187
Installing Binary Packages Using apt-getp. 188
Installing Source Packages using finkp. 189
Installing Source or Binary Packages Using Fink Commanderp. 190
Using The "Top 75 Security Tools" Listp. 192
Category: Attack (Network)p. 193
Category: Attack (Scanner)p. 194
Category: Attack (Web)p. 194
Category: Cryptop. 195
Category: Defensep. 196
Category: Defense / Forensicsp. 197
Category: Evasionp. 197
Category: Footprintingp. 198
Category: Monitor (Sniffing)p. 199
Category: Multipurposep. 201
Category: Password Crackingp. 201
Category: Password Cracking (Remote)p. 202
Category: Programmingp. 203
Category: Scanningp. 203
Installing and Using The "Big" Toolsp. 204
Wiresharkp. 204
Installing Wireshark on MacOS X from Sourcep. 204
Installing Wireshark on MacOS X Using DarwinPortsp. 210
Nessusp. 211
Summaryp. 215
Solutions Fast Trackp. 215
Links to Sitesp. 216
Frequently Asked Questionsp. 217
WarDriving and Wireless Penetration Testing with OS Xp. 219
Introductionp. 220
WarDriving with KisMACp. 220
Starting KisMAC and Initial Configurationp. 220
Configuring the KisMAC Preferencesp. 221
Scanning Optionsp. 222
Filter Optionsp. 223
Sound Preferencesp. 223
Trafficp. 226
KisMAC Preferencesp. 227
Mapping WarDrives with KisMACp. 228
Importing a Mapp. 228
Using a GPSp. 228
Ready to Importp. 229
WarDriving with KisMACp. 233
Using the KisMAC Interfacep. 233
The KisMAC Window View Buttonsp. 234
Additional View Options with KisMACp. 236
Penetration Testing with OS Xp. 238
Attacking WLAN Encryption with KisMACp. 238
Attacking WEP with KisMACp. 238
Reinjectionp. 240
Attacking WPA with KisMACp. 242
Other Attacksp. 243
Bruteforce Attacks Against 40-bit WEPp. 243
Wordlist Attacksp. 243
Other OS X Tools for WarDriving and WLAN Testingp. 243
Summaryp. 246
Solutions Fast Trackp. 246
Frequently Asked Questionsp. 248
Security and OS Xp. 251
Leopard and Tiger Evasionp. 252
Application Firewallp. 252
iSight Voyeurismp. 253
Reliable Local Stack Buffer Overflow Exploitationp. 255
dylib (Dynamic Library) Injection and Other Nifty Tricksp. 261
Return to dyld Stubs and libSystem for Tigerp. 264
Leopard and Address Space Layout Randomization (ASLR)p. 269
Month of Apple Bugsp. 272
Pressure on Vendors and Effectsp. 272
Overview of the Outcomep. 273
The Beginning: QuickTime RTSP URL Handler Flawp. 275
A iPhoto Photocast XML Format String Vulnerabilityp. 276
The Exploit of the Apesp. 277
Apple DMG and Filesystem-related Kernel Vulnerabilitiesp. 280
AppleTalk ATPsndrsp() Heap Buffer Overflow Vulnerabilityp. 281
A mDNSResponder in Scarletp. 282
The First Flaw: 1990 Style Stack Buffer Overflows Rockp. 284
The Second Flaw: When You Go Beyond the Limitsp. 285
Abusing the mDNSResponder for Remote Root Profitp. 287
Encryption Technologies and OS Xp. 289
Introduction: OS9 TO OS Xp. 290
OS X Security and Encryption: Encryption Within OS Xp. 291
The System Keychainp. 291
Better Keychain Securityp. 292
OS X Security and Encryption: OS X Password Encryptionp. 293
Symmetric Ciphersp. 293
Asymmetric Ciphersp. 293
Hashesp. 294
Password Crackingp. 295
Shadows and DESp. 295
SHA-1p. 296
Windows LAN Managerp. 296
Salt and Rainbow Tablesp. 297
Disk Images and Secure Virtual Disksp. 297
FileVault and Encrypted DMG Filesp. 297
AESp. 298
FileVaultp. 299
Plaintext Memoryp. 300
Insecure Hardwarep. 301
Firewire DMAp. 301
Patching DMAp. 302
Alternative RAM Attacksp. 303
Alternative Encryption Systemsp. 303
Wireless Encryptionp. 304
WEPp. 305
Initialization Vectorsp. 305
WEP Threatsp. 306
Wi-Fi Protected Access (WPA)p. 307
WPA Threatsp. 308
Entropy, Passwords, and WPAp. 308
Secure Communicationp. 309
Secure Socket Layerp. 309
Diffie and Hellman, Public Key Exchangep. 310
Man In the Middlep. 311
Certificate Authoritiesp. 312
Secure Communications: Summary of Suggestionsp. 312
Secure Shell and Tunnelingp. 313
Open Source Effortsp. 313
SSHp. 313
SSHDp. 316
VPN Encryptionp. 317
Vpnp. 317
PPTP, L2TP, and OPENVPNp. 317
IPsecp. 317
IPv6p. 318
Summaryp. 320
Referencesp. 320
Indexp. 323
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.