Jump to content
Nytro

Reverse Engineering Mac OS X

Recommended Posts

Posted

Reverse Engineering Mac OS X

Mac OS X

- 2005 and before

Mach-O Infection.ppt (presentation)

Breaking Mac OS X.ppt (presentation)

Hacking Mac OS X Kernel for unsupported machines.pdf (paper)

MacOS Kernel Insecurity.pdf (presentation)

Overriding Mac OS X.pdf (paper)

A Debugger with Gui in OS X.pdf (paper)

- 2006

Abusing Mach on Mac OS X.pdf (paper)

- 2007

Hacking Leopard.pdf (paper)

Inside the Mac_OS X_kernel.pdf (paper)

- 2008

BlackHat-Japan-08-Miller-Hacking-OSX.pdf (presentation)

BH-US-08-Dtrace The Reverse Engineer’s Unexpected Swiss Army Knife (presentation)

iRK – Crafting OS X Kernel Rootkits (presentation)

RETrace – Applied Reverse Engineering on OS X – defcon-16.pdf (presentation)

Under the iHood – REcon 2008.pdf (presentation)

Covering-tracks-Mac-OS-leopard_5991.pdf (paper)

OSX_Rootkits – the next level.pdf (presentation)

- 2009

Advanced Mac OSX Rootkits.pdf (paper)

Defcon-17-bosse_eriksson-kernel_patching_on_osx.pdf (presentation)

D1T1 – Dino Dai Zovi – Mac OS Xploitation.pdf (presentation)

Advanced-Mac-OS-X-rootkits.pdf (presentation)

Dynamic Tracing for Exploitation and Fuzzing-final.pdf (presentation)

Mac-os-malware-analysis_33178.pdf (paper)

Objective-c-internals.pdf (presentation)

Hacking Macs for Fun and Profit – csw09-daizovi-miller.pdf (presentation)

Macos xploitation-source2009.pdf (presentation)

Debugging Cocoa with DTrace.pdf (paper)

BlackHat-DC-09-Iozzo-Macho-on-the-fly.pdf (presentation)

Dynamically Overriding Mac OS X – Down the Rabbit Hole.pdf (presentation)

Encryption Wrapper on OSX.pdf (presentation)

- 2010

Function-hooking-for-OSX-and-Linux.pdf (presentation)

Mac Os X Hacking SnowLeopard.ppt (presentation)

BH-DC-2010-Advanced-Mac-OS-X-Physical-Memory-Analysis-slides.pdf (presentation)

BH-DC-2010-Advanced-Mac-OS-X-Physical-Memory-Analysis-wp.pdf (paper)

Post exploitation techniques on OSX and Iphone – eusecwest.pdf (presentation)

Programacion de rootkits en Mac OS X.pdf (paper, in Spanish)

- 2011

Defiling-Mac-OS-X-Kernel-Rootkits-Ruxcon.pdf (presentation)

Hacking at mach2.pdf (presentation)

The Apple Sandbox – BHDC2011-Paper.pdf (paper)

The Apple Sandbox – BHDC2011-Slides.pdf (presentation)

Battery Firmware Hacking.pdf (paper)

iSEC_BH2011 – Macs in the Age of APT.pdf (presentation)

iOS

- 2009

BlackHat-Europe-2009-Miller-Iozzo-OSX-IPhone-Payloads-whitepaper.pdf (paper)

- 2010

iPhone Rootkit Toorcon 2010.pdf (presentation)

D2T1 – Cedric Halbronn and Jean Sigwald – iPhone Security Model.pdf (presentation)

- 2011

D1T2 – Laurent Oudot – Extracting Senstive Data from Your iPhone.pdf (presentation)

D2T2 – Jean-Baptiste Be?drune & Jean Sigwald – iPhone Data Protection in Depth.pdf (presentation)

Auditing iPhone and iPad applications – van Sprundel.ppt (presentation)

Practical Consideration of iOS Device Encryption Security.pdf (paper)

Apple iOS 4 Security Evaluation.pdf (presentation)

BH_US_11_DaiZovi_iOS_Security_WP.pdf (paper)

BH_US_11_Belenko_iOS_Forensics_Slides.pdf (presentation)

BH_US_11_Belenko_iOS_Forensics_WP.pdf (paper)

BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf (presentation)

BH_US_11_Esser_Exploiting_The_iOS_Kernel_WP.pdf (paper)

D2T1 – Stefan Esser – iPhone Exploitation – One ROPe to Bind Them All.pdf (presentation)

D2 SIGINT – Keith Lee – iPhone Espionage.pdf (presentation)

D1T1 – Stefan Esser – Antid0te 2.0 – ASLR in iOS.pdf (presentation)

SysScan-Singapore-Targeting_The_IOS_Kernel.pdf (presentation)

Sursa: Papers | Reverse Engineering Mac OS X

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...