Free Summary — Full Book Available

macOS Security Research:
A Complete Framework

Six phases. Thirty-nine years of experience. From PING to responsible disclosure — the methodology that gets findings fixed rather than exploited.

✍ Stuart Paul Thomas ⌘ macOS / Darwin / XNU 🇬🇧 England & Wales © 2026 All Rights Reserved
Computer Misuse Act 1990 — England & Wales Unauthorised access to computer systems is a criminal offence under the Computer Misuse Act 1990. This applies regardless of intent. Conducting security research on systems without explicit written authorisation from the system owner is illegal. Security laws vary by jurisdiction — verify compliance with the laws in your own country before acting on any information in this document. The author accepts no liability for unlawful use of this material.

Where It Starts

The Question That Started Everything

In 1983, Mike Muuss was debugging a network problem at the University of Delaware. A gateway was silently dropping data — no error messages, no obvious cause. So he wrote a small programme: send an ICMP Echo Request, wait for a reply. A simple question: Are you there?

He called it PING. Forty years later, every serious security researcher knows that PING reveals things it was never designed to reveal.

When you send a malformed PING, you're testing an assumption. The system receives it and has to make a choice: reject it, try to parse it, or something in between. That choice — replicated millions of times — becomes a fingerprint. And sometimes, if you're paying attention, it becomes a vulnerability.

Security research isn't fundamentally about attack or defence. The engine underneath both is curiosity — the need to know what the system is actually doing, rather than what it's supposed to be doing.

— Stuart Paul Thomas, macOS Security Research: A Complete Framework

My professional career started in 1994 at University College Scarborough — doing everything: helpdesk, training, tech support, web development. In 2001, seven years in, I wrote a SANS paper on ICMP crafting that forced me to be explicit about methodology for the first time. That discipline became the framework in this book. Behind the professional career was a longer obsession: a retired teacher's Commodore PET I'd fixed for £5 in 1987, when I was eleven. Curiosity predated everything else.


The Methodology

The Six-Phase Framework

Effective security research isn't a single investigation — it's a structured process. The six phases below give you a repeatable methodology that produces findings you can defend, submit, and see fixed.

PHASE 01
Scope

Define what you're researching before you start. The most expensive mistake is six months of correct findings about the wrong thing.

PHASE 02
Recon

Build the map before you investigate. Recon is not looking for vulnerabilities — it's understanding where they might live.

PHASE 03
Research Tracks

Run multiple bounded investigations in parallel, each with a specific question, hypothesis, and evidence standard.

PHASE 04
Red-Team

Stress-test your own findings before anyone else does. The gap between believing you have a vulnerability and proving it is everything.

PHASE 05
Submit

Coordinate with vendors through the 90-day responsible disclosure timeline. Your research stops being yours at submission — make it count.

PHASE 06
Archive

Document as if someone else will use your notes to continue the research. Because they will. Archive is how knowledge survives.


Core Principles

What the Methodology Teaches

01

Specifications are aspirations. Code is reality. Security lives in the gap between what a specification says and what an implementation does. PING has had the same specification since 1981. Implementations have diverged ever since.

02

Verify everything. Static analysis lies. A code review can show you something might be vulnerable. Only a working proof of concept shows you it is. Never submit a finding you can't reproduce on a real system.

03

Responsible disclosure isn't a limitation. It's the point. Vendors work with researchers they trust. The security community respects work that's rigorous and responsible. Report findings in a way that gets them fixed, not exploited.

04

The BSD cross-reference is your most underused tool on macOS. Darwin's networking and VFS code traces back to FreeBSD and OpenBSD. A vulnerability patched in FreeBSD is worth immediately checking in XNU. The CVE history is public — use it.

05

Defence in depth buys time, not immunity. Code signing, SIP, ASLR, and Pointer Authentication each raise the cost of exploitation. None of them stops a determined attacker alone. Understanding what each control stops — and what it doesn't — is the researcher's contribution to defence.

06

The quality of your research reflects the quality of your questions. Not the tools you use. Not the CVEs you've found. The questions. Are you asking the right things? Are you listening to what the answers actually say, rather than what you hoped they'd say?


Full Book Contents

What the Complete Framework Covers

This summary gives you the spine. The full book gives you the muscle:

Ch.1

Why PING Matters — The history of ICMP, what a 40-year-old tool still reveals about modern operating systems, and why methodology is the through-line.

Ch.2

ICMP Crafting (2001) — The SANS Foundation research that built the framework. Fourteen years from a Commodore PET to a formal research methodology.

Ch.3

The Six-Phase Framework — The complete methodology in detail. Scope documents, recon maps, research track templates, red-team protocols, vendor submission, and archive standards.

Ch.4

Evidence Capture & Proof of Concept — The gap between believing you have a vulnerability and proving you have one. PoC development, reproduction standards, and evidence quality.

Ch.5

Writing for Vendors — The Day 1/45/90 timeline. How to write a disclosure that vendors actually act on. The craft of the first contact, the follow-up, and the deadline.

Ch.6

The Red-Team Conversation — How to stress-test your own findings before submission. The two failure modes: findings that don't survive scrutiny, and findings that are real but can't be explained clearly.

Ch.7

Responsible Disclosure — The legal framework (Computer Misuse Act 1990, England & Wales). CVE assignment. Coordinated disclosure timelines. What happens when vendors go quiet.

Ch.8

The macOS Security Landscape — XNU, Darwin, SIP, MACF, code signing, and notarisation. The BSD cross-reference technique. Where macOS research diverges from standard Unix research.

Ch.9

Building Your Defence — What security research teaches about defence. Why the researcher who understands vulnerabilities builds better defences. Curiosity as the through-line from 1987 to now.


Download the Full Book — Free

The complete framework: nine chapters, worked examples, macOS-specific techniques, vendor communication templates, and the full legal framework for England & Wales. Completely free.

PDF is print-ready on A4. EPUB works on Kindle, Apple Books, and all e-readers. No account required.


Are you there?

Still the most important question in security research. Ask it precisely. Listen carefully. Report honestly. — macOS Security Research: A Complete Framework