Hacking and Securing IOS Applications"O'Reilly Media, Inc.", 2012 - 336 頁 Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style. More importantly, this book will teach the reader how to write more secure code to make breaching your applications more difficult. Topics cover manipulating the Objective-C runtime, debugger abuse, hijacking network traffic, implementing encryption, geo-encryption, PKI without depending on certificate authorities, how to detect and prevent debugging, infection testing and class validation, jailbreak detection, and much more. Hacking and Securing iOS Applications teaches corporate developers and penetration testers exactly how to break into the latest versions of Apple's iOS operating system, attack applications, and exploit vulnerabilities, so that they can write more secure applications with what they've learned. With the App Store reaching over a half-million applications, tools that work with personal or confidential data are becoming increasingly popular. Developers will greatly benefit from Jonathan's book by learning about all of the weaknesses of iOS and the Objective-C environment. Whether you're developing credit card payment processing applications, banking applications, or any other kind of software that works with confidential data, Hacking and Securing iOS Applications is a must-read for those who take secure programming seriously |
其他版本 - 查看全部
常見字詞
App Store Apple Apple’s application application's attacker binary boot Breakpoint browser brute force bx lr cache Chapter code injection command compiler configuration connection const char copy created custom Cycript database debugger decrypt deleted desktop machine device’s dict dump encryption keys example export PLATFORM=/Developer/Platforms/iPhoneOS.platform filename filesystem flag function GNU Debugger header hello implementation inject inline installed interface iOS device iPhone isysroot iTunes jailbreaking jailbroken key derivation function launchd ldid loaded Mac OS X malware memory method mov r12 movl netcat NSString NSURLConnection NULL objc_msgSend Objective-C operating system output passcode passphrase password payload plist pointer protection proxy RAM disk raw disk image redsn0w ROWID runtime SaySomething server shared libraries size_t SQLite stolen struct target techniques unsigned char user’s void wipe Xcode