Syngress Publishing Announces Publication Of "os X For Hackers At Heart"
Wednesday, 7 December 2005 21:26 EST
Rockland, MA December 7, 2005--Syngress Publishing, Inc., today announced the publication of "OS X for Hackers at Heart" (ISBN: 7), which shows hackers how to torque the most powerful features of OS X for wireless networking, wardriving, software development, pen testing, automation, and more.
With sexy hardware, a powerful operating system, and easy-to-use applications, Apple has made OS X the operating system of choice for hackers everywhere. But as great as OS X is out of the box, hackers are eager to push the limits of what it was designed to do. Tweak and tune both software and hardware to start penetration testing or software development. See how the best and brightest use OS X for cutting-edge research, development, and just plain fooling around.
Inside the book coverage:
-Add Interfaces to the Mac
Add interfaces to create a multi-interface firewall or router, simulate a switch, add 802.3ad interface aggregation, or provide another media type.
-Use the Mac as a Router
See how a small low-power device such as a Mac Mini or an iBook expanded with USB-based Ethernet ports can push packets between networks.
-WarDrive with Your Mac
-Configure and use the KisMAC WLAN discovery tool to WarDrive.
-Penetration Test with OS X
Discover how all the best tools can be run from the Mac: nmap, Nessus, Ethereal, Snort, and more.
-Automate Your Mac!
Learn how to use Automator, AppleScript, and the bash shell to automate tasks and create slick front ends for command-line favorites!
-Discover Juicy Mac Hacking Tools
Compile Open Source tools directly on OS X using mainstream compilers and interpreters.
-Hack the iPod
Open your iPod, replace the battery, upgrade a 5GB iPod’s hard drive, and configure any iPod for Mac or Windows.
-Use OS X in a Windows Environment
Access file shares on a Windows server, mount network file systems via AppleScript, and connect to a Windows PPTP server.
-PowerBook Mac Tricks
Learn cool stunts you can do with the Apple motion sensor, the Apple Remote Desktop, Gestures, Sogudi, and more!
About the Authors
Bruce Potter is a Senior Associate at Booz Allen Hamilton. Prior to working at Booz Allen Hamilton, Bruce served as a software security consultant for Cigital in Dulles, VA. Bruce is the founder of the Shmoo Group of security professionals. His areas of expertise include wireless security, large-scale network architectures, smartcards, and promotion of secure software engineering practices. Bruce coauthored the books 802.11 Security and Mac OS X Security. He was trained in computer science at the University of Alaska, Fairbanks.
Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Recently, Johnny has enjoyed writing stuff and presenting stuff at conferences, which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. Johnny has written or contributed to several books, including Google Hacking for Penetration Testers from Syngress Publishing, which has secured rave reviews and has lots of pictures.
Ken Caruso is a Senior Systems Engineer for Serials Solutions a Pro Quest company. Serials Solutions empowers librarians and enables their patrons by helping them get the most value out of their electronic serials.
Previous to this Ken has worked at Alteon, a Boeing Company, Elevenwireless, and Digital Equipment Corporation. Ken's expertises include wireless networking, digital security, design and implementation of mission critical systems.
Chris Hurley (Roamer) is a Senior Penetration Tester working in the Washington, DC area. He is the founder of the WorldWide WarDrive, a four-year effort by INFOSEC professionals and hobbyists to generate awareness of the insecurities associated with wireless networks and is the lead organizer of the DEF CON WarDriving Contest. Chris is the lead author of WarDriving: Drive, Detect, Defend (Syngress, ISBN: 1-931836-03-5).
Tom Owad is a Macintosh consultant in south-central PA and the D.C. area and vice president of Keystone MacCentral. He serves on the board of directors of the Apple I Owners Club, where he is also webmaster and archivist. Tom is owner and Webmaster of Applefritter, a Macintosh community of artists and engineers. Tom is the author of the Syngress title, Apple I Replica Creation: Back to the Garage (ISBN:
1-931836-40-X).
Preston Norvell is a computer and networking geek. He has been fortunate to work as an administrator, engineer and consultant, and currently works as a network architect for a satellite communications company in the small town of Alaska, USA. He has pulled Ethernet cable through sewage melted by body heat, written the bill software for a utility, co-written a book on Mac OS X Security, designed and deployed systems and networks in places small and large, and ported Open Source software to Mac OS X.
Background Information
Syngress Publishing (www.syngress.com), headquartered in Rockland, Massachusetts, is an independent publisher of print and electronic reference materials for Information Technology professionals seeking skill enhancement and career advancement. Distributed throughout Europe, Asia, and the U.S. and Canada, Syngress titles have been translated into twenty languages. The Company's pioneering customer support program, , extends the value of every Syngress title with regular information updates and customer-driven author forums. For more information on Syngress products, contact Amy Pedersen at or email . Syngress books are distributed in the United States and Canada by O'Reilly Media, Inc.
|
|
Latest News
Avoid data leaks by clearing the page file 14.05.07 Security-Hacks publishes a useful tip to avoid potential data leaks when you run out of memory.
How to set Master Password in Firefox 11.05.07 Nowadays many web sites require you to type a user name and password before you can enter the site.
How to test your firewall? 10.05.07 Security tips blog, Security-Hacks, has published a compilation of tools to test your firewall: "We’ve compiled a list of tools we believe will be of value to both home users and advance users.
eEye released integer overflow auditing tool 16.02.07 Vulnerability research company eEye Security has released a free security vulnerability auditing tool that helps spotting possible integer overflow vulnerabilities.
AES Password Manager 2.3 released 16.02.07 AES software has announced the availability of AES Password Manager 2,3, the latest version of their password management application that allows users automatically access password-protected web sites and email accounts.
IBM safeguards against Microsoft vulnerabilities 16.02.07 IBM’s security division, Internet Security Systems, offers protection from several critical vulnerabilities announced by Microsoft.
Firefox cookie-stealing vulnerability 15.02.07 A new zero-day vulnerability in Mozilla Firefox allows malicious web sites to forge authentication cookies for certain web sites.
|
|