The Mac Hacker's Handbook and over one million other books are available for Amazon Kindle. Learn more
Buy New
$35.29
Qty:1
  • List Price: $49.99
  • Save: $14.70 (29%)
Only 8 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $2.19
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

The Mac Hacker's Handbook Paperback – March 3, 2009

ISBN-13: 978-0470395363 ISBN-10: 0470395362 Edition: 1st

Buy New
Price: $35.29
22 New from $25.50 22 Used from $16.13
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$35.29
$25.50 $16.13

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

The Mac Hacker's Handbook + iOS Hacker's Handbook + Mac OS X and iOS Internals: To the Apple's Core
Price for all three: $103.55

Buy the selected items together

NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 384 pages
  • Publisher: Wiley; 1 edition (March 3, 2009)
  • Language: English
  • ISBN-10: 0470395362
  • ISBN-13: 978-0470395363
  • Product Dimensions: 9.2 x 7.3 x 0.9 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Best Sellers Rank: #852,468 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

The honeymoon is over.

Prepare yourself to thwart Mac attacks.

Where security is concerned, Macs have long led a charmed existence. No more. If you manage security for a network that includes OS X machines, this update on the strengths and weaknesses of Mac OS X is required reading.

Beginning with the core differences between Mac OS X and Windows or Linux, this book follows the steps an attacker would take. You will learn the tools needed to find vulnerabilities, the techniques used to exploit them, and the means by which attackers maintain control once they gain access. When you know how they get in, you'll know how to keep them out.

  • See what makes Mac OS® X unique, what security improvements were added with Leopard®, and where vulnerabilities lie

  • Explore uncommon protocols—Bonjour®, the QuickTime® file format, and RTSP

  • Look for bugs in Apple's source code or use a black box technique such as fuzzing

  • Examine stack overflow and heap overflow attacks directed at PowerPC and x86 architectures, as well as shellcodes and payloads

  • Learn to inject code into running processes and how attackers use this technique

  • Understand Mac OS X-specific rootkit techniques

About the Author

CharlIe Millerwon the second CanSecWest Pwn2Own contest in 2008 and was named one of the Top 10 Computer Hackers of 2008 by Popular Mechanics.

Dino Dai Zovi won the first CanSecWest Pwn2Own contest in 2007 and was named one of the 15 Most Influential People in Security by eWEEK.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.3 out of 5 stars
5 star
5
4 star
0
3 star
1
2 star
1
1 star
0
See all 7 customer reviews
Overall, a great book for anyone interested in hacking, Mac OS X, or both.
J. Carlson
A great read at home or on the plane, it keeps you interested with detailed accounts of bugs found on this platform.
Prime
That's because the authors have done a near-perfect job of sticking to the topic at hand, the Mac.
Ryan L. Russell

Most Helpful Customer Reviews

20 of 20 people found the following review helpful By Zachary Cutlip on October 30, 2010
Format: Paperback Verified Purchase
The Mac Hacker's Handbook covers a lot of useful technical topics surrounding vulnerability analysis and exploit development for Mac OS X. That said, it doesn't so much teach you directly, as guide your learning. For example, it introduces the use of DTrace on OS X for dynamic analysis. It makes a very good case for DTrace's usefulness in reverse engineering, and for you to go out on your own and learn about it. Its DTrace examples aren't really freestanding, and require some background that you must get yourself. If the book were to give you the necessary background on every topic it introduces, it would be an enormous tome, and the authors probably would still be writing it.

Think of the book as explaining to you what all tools you need in your Mac hacking toolbox and why you need them, and how to put them together once you have them. It's up to you do go develop those skills on your own.

The biggest shortcoming of the book, however, is it is out of date. The concepts are sound and still very applicable, but the examples are written for OS X 10.5. Most do not work on Snow Leopard. Many you can get to work if you go out and beat the pavement trying to figure them out. I recommend this, but be aware, your progress through the book will be slow going as you get bogged down trying to figure out how to adapt each example so that it works.

This book succeeds if taken for what it is: a guide for your learning. You'll need to invest a fair amount of sweat equity to get the most out of it, though.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
17 of 17 people found the following review helpful By Ryan L. Russell on May 11, 2009
Format: Paperback
The Mac Hacker's Handbook is the best reference for Mac-specific attack information that I have found. At 368 pages, it may appear small compared to the typical 750+ page security tome. That's because the authors have done a near-perfect job of sticking to the topic at hand, the Mac. The authors do not succumb to the usual temptation to try and teach assembly language or reverse engineering. Rather, they do an excellent job touching on those topics in an OS X context, and assume the reader has a little background in that area already, or can otherwise keep up. I have done some limited research into the areas of Mac malware and process injection in the past. This book has done a fantastic job of filling in many holes in my knowledge that I hadn't been able to take care of before. Plus, it introduced me to a number of Mac-specific security features I wasn't aware of before. Highly recommended for anyone interested in Mac security.
3 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 8 people found the following review helpful By mjw on May 7, 2009
Format: Paperback
As a security professional Mac's are an interesting subject. They combine many of the best features from other operating systems into a wonderful package. I purchased a Macbook during a pen test about 8 months ago and have been in love with it since then. Before this book looking at security on Apple products was a difficult dive into the unknown. Charlie and Dino have done a lot of hard work and figured out the internals of OS X as related to security. They clearly present what's going inside the OS and how they learned the internals. This enables other security professionals to follow their method to both gain better understanding and to know what's wrong when something inevitably changes.

I'd definitely recommend this book for experienced security professionals looking to do exploit development on the Mac.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Prime on January 27, 2012
Format: Paperback Verified Purchase
This book provides insight into many applications and internals of Apple's Mac operating system from a security perspective, which was exactly what I was looking for. A great read at home or on the plane, it keeps you interested with detailed accounts of bugs found on this platform. It goes into detail on how the vulnerabilities occur and even how to exploit them. The authors are world class guys. Highly recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search

What Other Items Do Customers Buy After Viewing This Item?