iOS Hacker's HandbookJohn Wiley & Sons, 2012年5月8日 - 416 頁 Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.
iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks. |
內容
1 | |
7 | |
13 | |
Encryption | 47 |
Summary | 68 |
Breaking Code Signing | 95 |
Summary | 104 |
Summary | 137 |
ReturnOriented Programming | 219 |
Kernel Debugging and Exploitation | 249 |
Summary | 296 |
Baseband Attacks | 327 |
Nucleus PLUS | 336 |
Vulnerability Analysis | 342 |
An Overflow Exploitable Over the Air | 356 |
Summary | 362 |
其他版本 - 查看全部
常見字詞
0xcccccccc allocator App Store Apple application ASLR attacker baseband binary buffer overflow bugs bytes cache certificate chapter char code signing CommCenter configuration profile crash create Data Protection debugging decrypt Dtrace dyld example Figure filesystem firmware flags freelist function fuzz testing fuzzing gadget handler heap implementation input installed IOKit iOS devices iOS kernel iPhone iPhone Configuration Utility iPod jailbreak jailbroken kernel exploit kernel extension keychain Mac OS X malloc malware memory blocks mmap MobileSafari NULL object object lifetime OpenBTS operation overwrite passcode patch path allow plist pointer Profile Manager protocol ramdisk redsn0w ROP payload ropvalues i++ sandbox SBPL script server shellcode SMS messages source code stack string struct syscall system call TMSI TrustedBSD uint32_t unsigned int user space void vulnerability writable