Hacking and Securing IOS Applications"O'Reilly Media, Inc.", 2012 - Всего страниц: 336 Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style. More importantly, this book will teach the reader how to write more secure code to make breaching your applications more difficult. Topics cover manipulating the Objective-C runtime, debugger abuse, hijacking network traffic, implementing encryption, geo-encryption, PKI without depending on certificate authorities, how to detect and prevent debugging, infection testing and class validation, jailbreak detection, and much more. Hacking and Securing iOS Applications teaches corporate developers and penetration testers exactly how to break into the latest versions of Apple's iOS operating system, attack applications, and exploit vulnerabilities, so that they can write more secure applications with what they've learned. With the App Store reaching over a half-million applications, tools that work with personal or confidential data are becoming increasingly popular. Developers will greatly benefit from Jonathan's book by learning about all of the weaknesses of iOS and the Objective-C environment. Whether you're developing credit card payment processing applications, banking applications, or any other kind of software that works with confidential data, Hacking and Securing iOS Applications is a must-read for those who take secure programming seriously |
Другие издания - Просмотреть все
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software ... Jonathan Zdziarski Ограниченный просмотр - 2012 |
Часто встречающиеся слова и выражения
App Store Apple Apple’s application application’s attacker binary boot Breakpoint browser brute force cache Chapter code injection command compiler configuration connection const char contains copy created custom Cycript database debugger decrypt deleted desktop machine device’s dict dump encryption keys example export PLATFORM=/Developer/Platforms/iPhoneOS.platform filename filesystem flag function globl GNU Debugger hello implementation inject inline installed interface iOS device iPhone isysroot PLATFORM/Developer/SDKs/iPhoneOS5.0.sdk iTunes jailbreaking jailbroken key derivation function keychain launchd ldid loaded Mac OS X malicious code malware memory method movl MyDelegate netcat NSString NSURLConnection NULL objc_msgSend Objective-C operating system output passcode passphrase password payload Photo PLATFORM/Developer/usr/bin/arm-apple-darwin10-llvm-gcc-4.2 plist pointer protection proxy RAM disk raw disk image redsn0w runtime SaySomething server shared libraries size_t specified SQLite stolen struct target techniques unsigned char user’s void wipe Xcode