*OS Internals::Volume III - Security & Insecurity

Table of Contents

Part I: Defensive Techniques and Technologies

The missing documentation for Apple's proprietary security mechanisms


  1. About This Book
  2. Authentication
  3. Auditing (MacOS)
  4. Authorization - KAuth
  5. MACF - The Mandatory Access Control Framework
  6. Code Signing
  7.  
  8. authd and GateKeeper (MacOS)
  9. AppleMobileFileIntegrity (MacOS 10.10+, iOS)
  10. Sandboxing
  11. System Integrity Protection (MacOS 10.11+)
  12. Privacy
  13. Encryption
  14.  

    Part II: Vulnerabilities and Exploitation

    A detailed exploration of both the bugs and their exploits


  15. MacOS: Classic vulnerabilities in 10.10.x and 10.11.x
  16. iOS: Jailbreaking
  17. evasi0n (6.x)
  18. evasi0n 7 (7.0.x)
  19. Pangu Axe (7.1.x)
  20.  
  21. XuanYuan Sword (8.0-8.1)
  22. TaiG (8.0-8.1.2)
  23. TaiG (8.1.3-8.4)
  24. Pangu 9 (9.0.x) and 9.1
  25. Pangu 9.3 (9.2-9.3.3).................................................................................. 399
  26. Pegasus (9.0.1-9.3.4).................................................................................. 405
  27. mach_portal (10.1.1).................................................................................. 417
  28. Yalu (10.0-10.2).......................................................................... 431

Appendix: MacOS Hardening Guide