“At least thats the way it was described in the tech article I read at the time. Do you have contrary info about that?”
Search the thread for ‘metasploit’ and you’ll find the post with links to actual remote exploit code for macs.
These are remote listening network services.
Some of them are 3rd party apps... too bad they didn’t enable the NX bit.
First, you’re changing the subject from the challenge I posted to you.
Second, none of those is current, and none of them broke out into the wild, so what’s the point?
The MacBook Pro that the thread was originally talking about was set up with none of the available security devices enabled, and there were tons of hackers trying to beat its doors down, yet it took a very long time for it to be opened up, and even then, the rules of the challenge needed to be broken in order for the guy to get in.
Come on.
The NX bit is enabled by default in OSX Intel and the PowerPC version stacks and heaps are non-executable by design and don't require it. Now, if you are referring to some of the UNIX apps that come bundled with OSX and run outside of it, you might be correct. But then they are not really part of the default OSX.