12.07.2015 Views

Advanced Mac OS X Rootkits.pdf - Reverse Engineering Mac OS X

Advanced Mac OS X Rootkits.pdf - Reverse Engineering Mac OS X

Advanced Mac OS X Rootkits.pdf - Reverse Engineering Mac OS X

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Proxying <strong>Mac</strong>h Messages• Proxy maintains a <strong>Mac</strong>h port set– A port set has the same interface as a single port and canbe used identically in mach_msg()– Each proxy port in the set corresponds to the realdestination port name in the remote Agent– Port names can be arbitrary 32-bit values, so port setnames are pointers to real destination port name values• Received messages must be translated (local remote ports and descriptor bits)• Messages are serialized to byte buffers and thensent to Agent36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!