iOS Hacker's HandbookJohn Wiley & Sons, 2012年4月30日 - 416 頁 Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.
iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks. |
讀者評論 - 撰寫評論
我們找不到任何評論。
其他版本 - 查看全部
常見字詞
allocator allow App Store Apple Apple’s application ASLR attack surface baseband binary buffer overflow bugs bytecode bytes cache certificate chapter char code signing configuration profile crash create Data Execution Prevention Data Protection API debugging decrypt define Dtrace dyld encrypted example exploit filesystem firmware flags freelist function fuzzing heap iFauxn:~/ioshh root implementation inputs installed IOKit iOS device iPhone iPhone Configuration Utility jailbreak jailbroken kernel extension keybag keychain item loaded Mac OS X Mach-O malware memory mmap Mobile Device MobileSafari NULL object operation passcode patch path payload[i plist pointer Profile Manager protocol provisioning profile ramdisk redsn0w ROP payload ropvalues[i++ sandbox sandbox profile sandbox_init SBPL script server shellcode shown in Figure SMS messages stack struct syscall system call TrustedBSD unsigned int user space vulnerability writable