iOS Hacker's HandbookJohn Wiley & Sons, 2012年4月30日 - 416 頁 Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.
iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks. |
內容
| 1 | |
| 7 | |
| 15 | |
Encryption | 47 |
Code Signing and Memory Protections | 69 |
Summary | 104 |
Summary | 137 |
Exploitation | 185 |
ReturnOriented Programming | 219 |
Kernel Debugging and Exploitation | 249 |
Jailbreaking | 297 |
Clearing the Caches | 324 |
Appendix References | 365 |
其他版本 - 查看全部
常見字詞
0xbbbbbbbb allocator allow App Store Apple application ASLR attacker baseband binary buffer overflow bugs bytes cache certificate chapter char code signing configuration profile crash create Data Protection debugging decrypt Dtrace dyld example Figure filesystem firmware flags freelist function fuzz testing fuzzing gadget handler heap implementation input installed IOKit iOS devices iOS kernel iPhone iPhone Configuration Utility iPod jailbreak jailbroken kernel exploit kernel extension keychain Mac OS X malloc malware memory blocks mmap MobileSafari NULL object object lifetime OpenBTS operation overwrite Oxaaaaaaaa passcode patch path payload[i plist pointer Profile Manager protocol ramdisk redsn0w ROP payload ropvalues[i++ sandbox SBPL script server shellcode SMS messages source code stack string struct syscall system call TMSI TrustedBSD unsigned int user space vulnerability writable
