OS X exploits and defense

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it...

Descripción completa

Detalles Bibliográficos
Otros Autores: Baccas, Paul (-), Finisterre, Kevin
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627624806719
Tabla de Contenidos:
  • Front Cover; OS X Exploits and Defense; Copyright Page; Contributing Authors; Technical Editor; Contents; Chapter 1: Macintosh OS X Boot Process and Forensic Software; Introduction; The Boot Process; The Macintosh Boot Process; EFI and BIOS: Similar but Different; DARWIN; The OS X Kernel; Macintosh Forensic Software; BlackBag Forensic Suite; Directory Scan; FileSpy; HeaderBuilder; Other Tools; Carbon Copy Cloner; MacDrive6/7; Summary; Chapter 2: Past and Current Threats; Before the Flood; The 21st Century Threatscape; Apple Vulnerability/Update Retrospective; Exploit Development and Research
  • Chapter 3: Maliciou Macs: Malware and the MacIntroduction; Taxonomy of Malware; Viruses; Worms; Trojan Horses; Rootkits and Stealthkits; Bots and Botnets; Memetic Malware; Pre-OS X Mac Malware; HyperCard Infectors; Application and System Viruses; Trojans; Macro Malware; Heterogeneous Malware Transmission; Worms: AutoStart and After; OS X and Malware; Case Study-OSX/DNSChanger; Self-launching vs. User-launched; What Does That Mean?; Media Attitudes; Schadenfreude or Armageddon?; Is That It Then?; The Future; Message to the User Community; Message to Apple (and Microsoft!); Watch and Learn
  • SummarySolutions Fast Track; Frequently Asked Questions; Chapter 4: Malware Detection and the Mac; Introduction; Safe Out of the Box?; Anti-malware Technology; More About EICAR; Classic Anti-malware Detection Techniques; Signature Scanning; Heuristics Revealed; Anti-malware Products; Anti-malware Before OS X; Disinfectant; Anti-malware and OS X; avast!; ClamAV; ClamXav; Intego VirusBarrier; MacScan; McAfee Virex/VirusScan for Mac; Sophos; Symantec; Product Testing; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: Mac OS X for Pen Testers; Introduction
  • The OS X Command ShellCompiling and Porting Open Source Software; OS X Developer Tools; Perl; Configuring CPAN; Using CPAN's Interactive Mode; Using CPAN in Command-line Mode; Installing XWindows; Compiling Programs on Mac OS X; Compiling Versus Porting; Installing Ported Software on Mac OS X; Why Port: A Source Install Gone Bad!; OpenDarwin; Fink; Installing Binary Packages Using apt-get; Installing Source Packages using fink; Installing Source or Binary Packages Using Fink Commander; Using The "Top 75 Security Tools" List; Category: Attack (Network); Category: Attack (Scanner)
  • Category: Attack (Web)Category: Crypto; Category: Defense; Category: Defense / Forensics; Category: Evasion; Category: Footprinting; Category: Monitor (Sniffing); Category: Multipurpose; Category: Password Cracking; Category: Password Cracking (Remote); Category: Programming; Category: Scanning; Installing and Using The "Big" Tools; Wireshark; Installing Wireshark on MacOS X from Source; Installing Wireshark on MacOS X Using DarwinPorts; Nessus; Summary; Solutions Fast Track; Links to Sites; Frequently Asked Questions; Chapter 6: WarDriving and Wireless Penetration Testing with OS X
  • Introduction