This document summarizes techniques for exploiting kernel vulnerabilities on OS X systems. It outlines 10 steps to achieve direct kernel object manipulation (DKOM) by leveraging features like TrustedBSD and abusing interfaces like AppleHWAccess. Key steps involve bypassing kernel memory protections, installing a malicious MAC policy, and modifying unused system calls to achieve code execution. The document concludes that OS X security relies heavily on unwritten assumptions and is quite vulnerable due to a lack of mandatory access controls and read-write kernel memory.