Cargando…

IOS Hacker's Handbook.

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author tea...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miller, Charlie
Otros Autores: Blazakis, Dion, DaiZovi, Dino, Esser, Stefan, Iozzo, Vincenzo, Weinmann, Ralf-Philip
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Wiley, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn815648715
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 121018s2012 nyu ob 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d AUD  |d OCLCO  |d COO  |d EBLCP  |d OCLCQ  |d N$T  |d YDXCP  |d MEAUC  |d DEBSZ  |d OCLCQ  |d OCLCO  |d RECBK  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d MERUC  |d OCLCQ  |d OCLCO  |d ZCU  |d U3W  |d OCL  |d UUM  |d ICG  |d INT  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d DKC  |d OCLCQ  |d ERF  |d UHL  |d OCLCQ  |d UKBTH  |d OCLCQ  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 864908934  |a 1112538928  |a 1112919712  |a 1113579933  |a 1113686636  |a 1294539554 
020 |a 9781118240755  |q (electronic bk.) 
020 |a 1118240758  |q (electronic bk.) 
020 |a 9781118265543  |q (electronic bk.) 
020 |a 1118265548  |q (electronic bk.) 
020 |a 9781118228432  |q (electronic bk.) 
020 |a 111822843X  |q (electronic bk.) 
020 |z 9781118204122  |q (pbk.) 
020 |z 1118204123  |q (pbk.) 
024 8 |a 9781118240755 
028 0 1 |a EB00063194  |b Recorded Books 
029 1 |a AU@  |b 000051046343 
029 1 |a DEBBG  |b BV044160139 
029 1 |a DEBSZ  |b 397187149 
035 |a (OCoLC)815648715  |z (OCoLC)864908934  |z (OCoLC)1112538928  |z (OCoLC)1112919712  |z (OCoLC)1113579933  |z (OCoLC)1113686636  |z (OCoLC)1294539554 
050 4 |a QA76.774.I67 I67 2012 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Miller, Charlie. 
245 1 0 |a IOS Hacker's Handbook. 
260 |a New York :  |b Wiley,  |c 2012. 
300 |a 1 online resource (410 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Print version record. 
520 |a Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads. 
504 |a Includes bibliographical references. 
505 0 |a IOS Hacker's Handbook; Contents; Chapter 1 iOS Security Basics; iOS Hardware/Device Types; How Apple Protects the App Store; Understanding Security Threats; Understanding iOS Security Architecture; The Reduced Attack Surface; The Stripped-Down iOS; Privilege Separation; Code Signing; Data Execution Prevention; Address Space Layout Randomization; Sandboxing; A Brief History of iOS Attacks; Libtiff; Fun with SMS; The Ikee Worm; Storm8; SpyPhone; Pwn2Own 2010; Jailbreakme.com 2 ("Star"); Jailbreakme.com 3 ("Saffron"); Summary; Chapter 2 iOS in the Enterprise; iOS Configuration Management. 
505 8 |a Mobile Configuration ProfilesiPhone Configuration Utility; Creating a Configuration Profile; Installing the Configuration Profile; Updating Profiles; Removing Profiles; Applications and Provisioning Profiles; Mobile Device Management; MDM Network Communication; Lion Server Profile Manager; Setting Up Profile Manager; Creating Settings; Enrolling Devices; Summary; Chapter 3 Encryption; Data Protection; Data Protection API; Attacking Data Protection; Attacking User Passcodes; iPhone Data Protection Tools; Installation Prerequisites; Building the Ramdisk; Booting Ramdisk. 
505 8 |a Brute-Force Attacking Four-Digit PasscodesDumping Keychain; Dumping Data Partition; Decrypting Data Partition; Summary; Chapter 4 Code Signing and Memory Protections; Understanding Mandatory Access Control; AMFI Hooks; AMFI and execv; How Provisioning Works; Understanding the Provisioning Profile; How the Provisioning File Is Validated; Understanding Application Signing; Inside Entitlements; How Code Signing Enforcement Works; Collecting and Verifying Signing Information; How Signatures Are Enforced on Processes; How the iOS Ensures No Changes Are Made to Signed Pages. 
505 8 |a Discovering Dynamic Code SigningWhy MobileSafari Is So Special; How the Kernel Handles JIT; Attacking Inside MobileSafari; Breaking Code Signing; Altering iOS Shellcode; Using Meterpreter on iOS; Gaining App Store Approval; Summary; Chapter 5 Sandboxing; Understanding the Sandbox; Sandboxing Your Apps; Understanding the Sandbox Implementation; Understanding User Space Library Implementation; Into the Kernel; Implementing TrustedBSD; Handling Configuration from User Space; Policy Enforcement; How Profile Bytecode Works; How Sandboxing Impacts App Store versus Platform Applications; Summary. 
505 8 |a Chapter 6 Fuzzing iOS ApplicationsHow Fuzzing Works; The Recipe for Fuzzing; Mutation-Based ("Dumb") Fuzzing; Generation-Based ("Smart") Fuzzing; Submitting and Monitoring the Test Cases; Fuzzing Safari; Choosing an Interface; Generating Test Cases; Testing and Monitoring the Application; Adventures in PDF Fuzzing; Quick Look Fuzzing; Fuzzing with the Simulator; Fuzzing MobileSafari; Selecting the Interface to Fuzz; Generating the Test Case; Fuzzing and Monitoring MobileSafari; PPT Fuzzing Fun; SMS Fuzzing; SMS Basics; Focusing on the Protocol Data Unit Mode; Using PDUspy. 
542 |f Copyright © John Wiley & Sons  |g 2012 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a iOS (Electronic resource) 
630 0 7 |a iOS (Electronic resource)  |2 fast 
650 0 |a Operating systems (Computers)  |x Security measures. 
650 0 |a Application software  |x Security measures. 
650 0 |a Application software  |x Development. 
650 6 |a Systèmes d'exploitation (Ordinateurs)  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Développement. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a Operating systems (Computers)  |x Security measures  |2 fast 
700 1 |a Blazakis, Dion. 
700 1 |a DaiZovi, Dino. 
700 1 |a Esser, Stefan. 
700 1 |a Iozzo, Vincenzo. 
700 1 |a Weinmann, Ralf-Philip. 
758 |i has work:  |a iOS hacker's handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGJXGbcXP3kQ6hdfCkPRcd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781118204122 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=821875  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL821875 
938 |a EBSCOhost  |b EBSC  |n 518572 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00063194 
938 |a YBP Library Services  |b YANK  |n 9808240 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21630041 
994 |a 92  |b IZTAP