
OS X for Hackers at Heart
By: Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
Paperback | 5 November 2005
At a Glance
512 Pages
22.9 x 17.8 x 3.18
Paperback
RRP $80.95
$76.25
or 4 interest-free payments of $19.06 with
orExpected to ship in at least 4 weeks
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple's Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive
Foreword | p. xxi |
A Network Admin's Guide to Using Mac OS X | p. 1 |
Introduction | p. 2 |
Running a Headless Mac | p. 3 |
Apple Remote Desktop | p. 4 |
VNC | p. 5 |
SSH | p. 8 |
Serial Console | p. 9 |
Adding Interfaces to the Mac | p. 19 |
Physical Interfaces | p. 20 |
Interface Aliases | p. 21 |
The Macintosh as a Router | p. 25 |
Basic Host Routing | p. 26 |
Basic Static Routing | p. 29 |
Basic Dynamic Network Routing | p. 30 |
"Real" Routing with Zebra | p. 32 |
Mac OS X as a RADIUS server | p. 42 |
FreeRADIUS | p. 44 |
Summary | p. 50 |
Solutions Fast Track | p. 50 |
Frequently Asked Questions | p. 51 |
Automation | p. 53 |
Introduction | p. 54 |
Using Automator | p. 55 |
Creating a One-shot Automation | p. 58 |
Creating a More Versatile Automation | p. 61 |
Saving Automations as Applications and Workflows | p. 62 |
Saving Automations as Plug-ins | p. 64 |
Hacker-friendly Automator Actions | p. 69 |
Understanding AppleScript | p. 81 |
Introducing the Script Editor | p. 81 |
Hello, World! | p. 83 |
Recording Actions | p. 84 |
AppleScript Save Options | p. 86 |
Script Assistant | p. 87 |
AppleScript Dictionary | p. 88 |
Not Quite An AppleScript Language Guide | p. 89 |
Learning By Example: Interactive Dialogs | p. 95 |
Interactive Dialog Boxes | p. 95 |
Bash Scripting | p. 100 |
Foundations of Shell Scripting | p. 101 |
Harnessing Mac's UNIX Commands | p. 119 |
Sed | p. 122 |
Awk | p. 124 |
Pulling It Together: A bash Mini-project | p. 126 |
Curl | p. 134 |
Lynx | p. 135 |
Bridging the Gap From bash to AppleScript | p. 138 |
Using Bash, AppleScript, and Automator Together! | p. 139 |
Overcoming Automator's Lame Display Dialogs | p. 140 |
Exchanging Data With AppleScript | p. 141 |
Exchanging Data With Bash | p. 143 |
Ethereal Auto-Launcher | p. 144 |
Password-protected Zip and Unzip | p. 146 |
Basic nmap Front-end | p. 153 |
Summary | p. 156 |
Solutions Fast Track | p. 156 |
Links to Sites | p. 157 |
Frequently Asked Questions | p. 158 |
OS X in a Microsoft Environment | p. 159 |
Introduction | p. 160 |
Who Should Read this Chapter? | p. 160 |
Windows Terms You Should Know | p. 161 |
Accessing Network File Systems | p. 163 |
Mounting Network File Systems via AppleScript | p. 166 |
Mounting Network File Systems via Terminal | p. 168 |
Microsoft Distributed File System | p. 171 |
NTLM Authentication | p. 172 |
Accessing NTLM-Protected Web Servers via the Command Line | p. 173 |
Using an NTLM-Protected Proxy from the Command Line | p. 174 |
Using a Local Proxy to Handle NTLM Authentication | p. 175 |
Connecting to a Windows PPTP Server | p. 180 |
Split Tunneling | p. 182 |
Routing DNS Requests | p. 184 |
Zen of Running Windows Boxes from a Mac | p. 185 |
MS Remote Desktop Client | p. 185 |
Rdesktop-The Open Source Remote Desktop Client | p. 191 |
Virtual Network Computing | p. 197 |
Synergy-Using a Mac and PC from one Keyboard/Mouse | p. 202 |
Installing and Configuring Synergy | p. 203 |
Talking to Windows From the Terminal | p. 207 |
Summary | p. 218 |
Solutions Fast Track | p. 219 |
Frequently Asked Questions | p. 221 |
WarDriving and Wireless Penetration Testing with OS X | p. 223 |
Introduction | p. 224 |
WarDriving with KisMAC | p. 224 |
KisMAC Startup and Initial Configuration | p. 225 |
Configuring the KisMAC Preferences | p. 226 |
Mapping WarDrives with KisMAC | p. 233 |
Practicing WarDriving with KisMAC | p. 239 |
Penetration Testing with OS X | p. 244 |
Attacking WLAN Encryption with KisMAC | p. 244 |
Attacking WPA with KisMAC | p. 248 |
Other Attacks | p. 249 |
Other OS X Tools for WarDriving and WLAN Testing | p. 250 |
Summary | p. 253 |
Solutions Fast Track | p. 253 |
Frequently Asked Questions | p. 255 |
Mac OS X for Pen Testers | p. 257 |
Introduction | p. 258 |
The OS X Command Shell | p. 260 |
Compiling and Porting Open Source Software | p. 264 |
OS X Developer Tools | p. 264 |
Perl | p. 266 |
Installing XWindows | p. 273 |
Compiling Programs on Mac OS X | p. 275 |
Compiling Versus Porting | p. 276 |
Installing Ported Software on Mac OS X | p. 277 |
Using The "Top 75 Security Tools" List | p. 288 |
Category: Attack (Network) | p. 289 |
Category: Attack (Scanner) | p. 290 |
Category: Attack (Web) | p. 290 |
Category: Crypto | p. 291 |
Category: Defense | p. 292 |
Category: Defense / Forensics | p. 294 |
Category: Evasion | p. 294 |
Category: Footprinting | p. 294 |
Category: Monitor (Sniffing) | p. 295 |
Category: Multipurpose | p. 298 |
Category: Password Cracking | p. 298 |
Category: Password Cracking (Remote) | p. 299 |
Category: Programming | p. 300 |
Category: Scanning | p. 300 |
Installing and Using The "Big" Tools | p. 301 |
Ethereal | p. 301 |
Nessus | p. 303 |
Other OS X "Must Haves" | p. 306 |
Running CD-based Linux Distributions | p. 308 |
Summary | p. 312 |
Solutions Fast Track | p. 312 |
Frequently Asked Questions | p. 315 |
Mac Tricks (Stupid Powerbook Stunts That Make You Look Like a God) | p. 317 |
Introduction | p. 318 |
Desktop Console | p. 318 |
Screen Savers | p. 320 |
Widgets | p. 322 |
System | p. 322 |
Internet | p. 323 |
Calculators and Converters | p. 326 |
Fun | p. 327 |
Apple Motion Sensor | p. 328 |
VNC with Apple Remote Desktop | p. 331 |
Gestures | p. 334 |
Sogudi | p. 337 |
GUI Scripts | p. 339 |
Summary | p. 343 |
Solutions Fast Track | p. 343 |
Frequently Asked Questions | p. 345 |
OS X For the Road Warrior | p. 347 |
Introduction | p. 348 |
Safe and Secure E-mail | p. 348 |
IMAP SSL | p. 350 |
STARTTLS | p. 352 |
GnuPG | p. 353 |
Connecting From Anywhere (Almost) | p. 354 |
GPRS Example | p. 355 |
Firewalling Your Mac | p. 359 |
Battery Management | p. 361 |
Conservation Tips | p. 361 |
Calibration and Total Discharge | p. 363 |
Resetting the Power Manager | p. 364 |
Summary | p. 365 |
Solutions Fast Track | p. 365 |
Frequently Asked Questions | p. 366 |
Hacking the iPod | p. 369 |
Introduction | p. 370 |
Opening Your iPod | p. 374 |
Preparing for the Hack | p. 375 |
First Generation iPods | p. 376 |
Second and Third-Generation iPods | p. 379 |
Replacing the iPod Battery | p. 382 |
Preparing for the Hack | p. 383 |
Battery Replacement: First and Second-Generation iPods | p. 385 |
Battery Replacement: Third-Generation iPods | p. 390 |
Upgrading a 5GB iPod's Hard Drive | p. 397 |
Preparing for the Hack | p. 398 |
Performing the Hack | p. 399 |
From Mac to Windows and Back Again | p. 409 |
Preparing for the Hack | p. 409 |
Going from Windows to Macintosh | p. 410 |
Going from Macintosh to Windows | p. 411 |
iPod Diagnostic Mode | p. 413 |
The Diagnostic Menu | p. 413 |
Disk Check | p. 416 |
Additional iPod Hacks | p. 418 |
Installing Linux on an iPod | p. 418 |
Repairing the FireWire Port | p. 418 |
Scroll Wheel Fix | p. 419 |
iPod Resources on the Web | p. 420 |
Index | p. 423 |
Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9781597490405
ISBN-10: 1597490407
Published: 5th November 2005
Format: Paperback
Language: English
Number of Pages: 512
Audience: Professional and Scholarly
Publisher: SYNGRESS
Country of Publication: US
Dimensions (cm): 22.9 x 17.8 x 3.18
Weight (kg): 0.65
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Navigating Supply Chain Turbulence
Leveraging Modern Technologies for Safety, Resilience, and Risk Reduction
Hardcover
RRP $305.00
$304.25