logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

The Mac Hacker's Handbook

The Mac Hacker's Handbook (Paperback)

Charles Miller, Dino Dai A. Zovi (지은이)
John Wiley & Sons Inc
86,230원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 로딩중
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

The Mac Hacker's Handbook
eBook 미리보기

책 정보

· 제목 : The Mac Hacker's Handbook (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 운영체제(OS) > 매킨토시
· ISBN : 9780470395363
· 쪽수 : 384쪽
· 출판일 : 2009-02-01

목차

Foreword.

Introduction.

Part I Mac OS X Basics.

Chapter 1 Mac OS X Architecture.

Basics.

XNU.

Mach.

BSD.

I/O Kit.

Darwin and Friends.

Tools of the Trade.

Ktrace/DTrace.

Objective-C.

Universal Binaries and the Mach-O File Format.

Universal Binaries.

Mach-O File Format.

Example.

Bundles.

launchd.

Leopard Security.

Library Randomization.

Executable Heap.

Stack Protection (propolice).

Firewall.

Sandboxing (Seatbelt).

References.

Chapter 2 Mac OS X Parlance.

Bonjour!.

Get an IP Address.

Set Up Name Translation.

Service Discovery.

Bonjour.

mDNSResponder.

Source Code.

QuickTime.

.mov.

RTSP.

Conclusion.

References.

Chapter 3 Attack Surface.

Searching the Server Side.

Nonstandard Listening Processes.

Cutting into the Client Side.

Safari.

All of Safari’s Children.

Safe File Types.

Having Your Cake.

Conclusion .

References.

Part II Discovering Vulnerabilities.

Chapter 4 Tracing and Debugging.

Pathetic ptrace.

Good Ol’ GDB.

DTrace.

D Programming Language.

Describing Probes.

Example: Using Dtrace.

Example: Using ltrace.

Example: Instruction Tracer/Code-Coverage Monitor.

Example: Memory Tracer.

PyDbg.

PyDbg Basics.

Memory Searching.

In-Memory Fuzzing.

Binary Code Coverage with Pai Mei.

iTunes Hates You.

Conclusion.

References.

Chapter 5 Finding Bugs.

Bug-Hunting Strategies.

Old-School Source-Code Analysis.

Getting to the Source.

Code Coverage.

CanSecWest 2008 Bug.

vi + Changelog = Leopard 0-day.

Apple’s Prerelease-Vulnerability Collection.

Fuzz Fun.

Network Fuzzing.

File Fuzzing.

Conclusion.

References.

Chapter 6 Reverse Engineering.

Disassembly Oddities.

EIP-Relative Data Addressing.

Messed-Up Jump Tables.

Identifying Missed Functions.

Reversing Obj-C.

Cleaning Up Obj-C.

Shedding Light on objc_msgSend Calls.

Case Study.

Patching Binaries.

Conclusion.

References.

Part III Exploitation.

Chapter 7 Exploiting Stack Overflows.

Stack Basics.

Stack Usage on PowerPC.

Stack Usage on x86.

Smashing the Stack on PowerPC.

Smashing the Stack on x86.

Exploiting the x86 Nonexecutable Stack.

Return into system().

Executing the Payload from the Heap.

Finding Useful Instruction Sequences.

PowerPC.

x86.

Conclusion.

References.

Chapter 8 Exploiting Heap Overflows.

The Heap.

The Scalable Zone Allocator.

Regions.

Freeing and Allocating Memory.

Overwriting Heap Metadata.

Arbitrary 4-Byte Overwrite.

Large Arbitrary Memory Overwrite.

Obtaining Code Execution.

Taming the Heap with Feng Shui.

Fill ’Er Up.

Feng Shui.

WebKit’s JavaScript.

Case Study.

Feng Shui Example.

Heap Spray.

References.

Chapter 9 Exploit Payloads.

Mac OS X Exploit Payload Development.

Restoring Privileges.

Forking a New Process.

Executing a Shell.

Encoders and Decoders.

Staged Payload Execution.

Payload Components.

PowerPC Exploit Payload.

execve_binsh.

system.

decode_longxor.

tcp_listen 231.

tcp_connect.

tcp_find.

dup2_std_fds.

vfork.

Testing Simple Components.

Putting Together Simple Payloads.

Intel x86 Exploit Payloads.

remote_execution_loop.

inject_bundle.

Testing Complex Components.

Conclusion.

References.

Chapter 10 Real-World Exploits.

QuickTime RTSP Content-Type Header Overflow.

Triggering the Vulnerability.

Exploitation on PowerPC.

Exploitation on x86.

mDNSResponder UPnP Location Header Overflow.

Triggering the Vulnerability.

Exploiting the Vulnerability.

Exploiting on PowerPC.

QuickTime QTJava toQTPointer() Memory Access.

Exploiting toQTPointer().

Obtaining Code Execution.

Conclusion.

References.

Part IV Post-Exploitation.

Chapter 11 Injecting, Hooking, and Swizzling.

Introduction to Mach.

Mach Abstractions.

Mach Security Model Mach Exceptions.

Mach Injection.

Remote Threads.

Remote Process Memory.

Loading a Dynamic Library or Bundle.

Inject-Bundle Usage.

Example: iSight Photo Capture.

Function Hooking.

Example: SSLSpy.

Objective-C Method Swizzling.

Example: iChat Spy.

Conclusion.

References.

Chapter 12 Rootkits.

Kernel Extensions.

Hello Kernel.

System Calls.

Hiding Files.

Hiding the Rootkit.

Maintaining Access across Reboots.

Controlling the Rootkit.

Creating the RPC Server.

Injecting Kernel RPC Servers.

Calling the Kernel RPC Server.

Remote Access.

Hardware-Virtualization Rootkits.

Hyperjacking.

Rootkit Hypervisor.

Conclusion.

References.

Index.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책