AdvancedReverse EngineeringmacOSExploitation

The Mac Hacker's Handbook

3 / 5

Charlie Miller and Dino Dai Zovi's 2009 deep dive into the Mac OS X exploit landscape — Mach-O, IPC, sandboxing as it then existed, and the early-Intel-Mac exploitation chains.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2009
Publisher
Wiley
Pages
384
Language
English

Read this if

Reverse engineers and exploit developers who want the historical foundation of Mac exploitation, especially as a stepping stone to The Art of Mac Malware (Wardle). Most useful for the conceptual scaffolding around Mach, Objective-C runtimes, and IPC, which are still load-bearing on modern macOS.

Skip this if

Anyone needing current Apple-silicon, Hardened Runtime, System Integrity Protection, Endpoint Security, or modern sandbox-escape tradecraft. The book is pre-iPhone-era macOS in spirit; 2009 was a different planet.

Key takeaways

  • The conceptual material (Mach, IPC, Mach-O, Objective-C dispatch) generalizes to modern macOS; the specific exploits do not.
  • Most of the value is historical archaeology — knowing why the macOS sandbox and SIP exist is far easier after this book.
  • Pair with current Wardle and Apple Platform Security material for any operational use; treat this as background reading.

Notes

Read with The Art of Mac Malware Vol 1 (Wardle) for the modern continuation and with Apple's Platform Security Guide (the most recent edition) for the current operating environment. Charlie Miller's later DEF CON / Pwn2Own presentations are the live-fire complement. A historical reference in 2026, but a useful one if you want the genealogy of Apple security; otherwise skip directly to Wardle.