- Paperback: 384 pages
- Publisher: Wiley; 1 edition (March 3, 2009)
- Language: English
- ISBN-10: 0470395362
- ISBN-13: 978-0470395363
- Product Dimensions: 7.4 x 0.8 x 9.2 inches
- Shipping Weight: 1.2 pounds (View shipping rates and policies)
- Average Customer Review: 10 customer reviews
- Amazon Best Sellers Rank: #1,264,194 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Mac Hacker's Handbook 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
See the Best Books of 2017
Looking for something great to read? Browse our editors' picks for the best books of the year in fiction, nonfiction, mysteries, children's books, and much more.
Frequently bought together
Customers who bought this item also bought
From the Back Cover
The honeymoon is over.
Prepare yourself to thwart Mac attacks.
Where security is concerned, Macs have long led a charmed existence. No more. If you manage security for a network that includes OS X machines, this update on the strengths and weaknesses of Mac OS X is required reading.
Beginning with the core differences between Mac OS X and Windows or Linux, this book follows the steps an attacker would take. You will learn the tools needed to find vulnerabilities, the techniques used to exploit them, and the means by which attackers maintain control once they gain access. When you know how they get in, you'll know how to keep them out.
See what makes Mac OS® X unique, what security improvements were added with Leopard®, and where vulnerabilities lie
Explore uncommon protocolsBonjour®, the QuickTime® file format, and RTSP
Look for bugs in Apple's source code or use a black box technique such as fuzzing
Examine stack overflow and heap overflow attacks directed at PowerPC and x86 architectures, as well as shellcodes and payloads
Learn to inject code into running processes and how attackers use this technique
Understand Mac OS X-specific rootkit techniques
About the Author
CharlIe Millerwon the second CanSecWest Pwn2Own contest in 2008 and was named one of the Top 10 Computer Hackers of 2008 by Popular Mechanics.
Dino Dai Zovi won the first CanSecWest Pwn2Own contest in 2007 and was named one of the 15 Most Influential People in Security by eWEEK.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Think of the book as explaining to you what all tools you need in your Mac hacking toolbox and why you need them, and how to put them together once you have them. It's up to you do go develop those skills on your own.
The biggest shortcoming of the book, however, is it is out of date. The concepts are sound and still very applicable, but the examples are written for OS X 10.5. Most do not work on Snow Leopard. Many you can get to work if you go out and beat the pavement trying to figure them out. I recommend this, but be aware, your progress through the book will be slow going as you get bogged down trying to figure out how to adapt each example so that it works.
This book succeeds if taken for what it is: a guide for your learning. You'll need to invest a fair amount of sweat equity to get the most out of it, though.
Overall, a great book for anyone interested in hacking, Mac OS X, or both. Of course, if you're into iPhone hacking, this is a good place to start as well, and the authors know a thing or two there as well...