Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Dino Dai Zovi, Charlie Miller
The Mac Hacker's Handbook
Cover
Title Page
Copyright
Dedication
About the Authors
Credits
Acknowledgments
Foreword
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What’s on the Website
Final Note
Part I: Mac OS X Basics
Chapter 1: Mac OS X Architecture
Basics
Tools of the Trade
Ktrace/DTrace
Objective-C
Universal Binaries and the Mach-O File Format
Bundles
launchd
Leopard Security
References
Chapter 2: Mac OS X Parlance
Bonjour!
QuickTime
Conclusion
References
Chapter 3: Attack Surface
Searching the Server Side
Cutting into the Client Side
Conclusion
References
Part II: Discovering Vulnerabilities
Chapter 4: Tracing and Debugging
Pathetic ptrace
Good Ol’ GDB
DTrace
PyDbg
iTunes Hates You
Conclusion
References
Chapter 5: Finding Bugs
Bug-Hunting Strategies
Old-School Source-Code Analysis
vi + Changelog = Leopard 0-day
Apple’s Prerelease-Vulnerability Collection
Fuzz Fun
Conclusion
References
Chapter 6: Reverse Engineering
Disassembly Oddities
Reversing Obj-C
Case Study
Conclusion
References
Part III: Exploitation
Chapter 7: Exploiting Stack Overflows
Stack Basics
Smashing the Stack on PowerPC
Smashing the Stack on x86
Exploiting the x86 Non-executable Stack
Finding Useful Instruction Sequences
Conclusion
References
Chapter 8: Exploiting Heap Overflows
The Heap
The Scalable Zone Allocator
Overwriting Heap Metadata
Taming the Heap with Feng Shui
Case Study
References
Chapter 9: Exploit Payloads
Mac OS X Exploit Payload Development
PowerPC Exploit Payloads
Intel x86 Exploit Payloads
Conclusion
References
Chapter 10: Real-World Exploits
QuickTime RTSP Content-Type Header Overflow
mDNSResponder UPnP Location Header Overflow
QuickTime QTJava toQTPointer() Memory Access
Conclusion
References
Part IV: Post-Exploitation
Chapter 11: Injecting, Hooking, and Swizzling
Introduction to Mach
Mach Injection
Function Hooking
Objective-C Method Swizzling
Conclusion
References
Chapter 12: Rootkits
Kernel Extensions
System Calls
Hiding Files
Hiding the Rootkit
Maintaining Access across Reboots
Controlling the Rootkit
Remote Access
Hardware-Virtualization Rootkits
Conclusion
References
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Table of Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset