Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It"O'Reilly Media, Inc.", 2012年1月17日 - 358 頁 If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.
|
其他版本 - 查看全部
常見字詞
App Store Apple Apple’s application application’s attacker binary boot Breakpoint browser brute force cache Chapter code injection command compiler configuration connection const char contains copy created custom Cycript database debugger decrypt deleted desktop machine device’s dict dump encryption keys example export PLATFORM=/Developer/Platforms/iPhoneOS.platform filename filesystem flag function globl GNU Debugger hello implementation inject inline installed interface iOS device iPhone isysroot PLATFORM/Developer/SDKs/iPhoneOS5.0.sdk iTunes jailbreaking jailbroken key derivation function keychain launchd ldid loaded Mac OS X malicious code malware memory method movl MyDelegate netcat NSString NSURLConnection NULL objc_msgSend Objective-C operating system output passcode passphrase password payload Photo PLATFORM/Developer/usr/bin/arm-apple-darwin10-llvm-gcc-4.2 plist pointer protection proxy RAM disk raw disk image redsn0w runtime SaySomething server shared libraries size_t specified SQLite stolen struct target techniques unsigned char user’s void wipe Xcode