Cargando…

IOS Hacker's Handbook.

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author tea...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miller, Charlie
Otros Autores: Blazakis, Dion, DaiZovi, Dino, Esser, Stefan, Iozzo, Vincenzo, Weinmann, Ralf-Philip
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Wiley, 2012.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • IOS Hacker's Handbook; Contents; Chapter 1 iOS Security Basics; iOS Hardware/Device Types; How Apple Protects the App Store; Understanding Security Threats; Understanding iOS Security Architecture; The Reduced Attack Surface; The Stripped-Down iOS; Privilege Separation; Code Signing; Data Execution Prevention; Address Space Layout Randomization; Sandboxing; A Brief History of iOS Attacks; Libtiff; Fun with SMS; The Ikee Worm; Storm8; SpyPhone; Pwn2Own 2010; Jailbreakme.com 2 ("Star"); Jailbreakme.com 3 ("Saffron"); Summary; Chapter 2 iOS in the Enterprise; iOS Configuration Management.
  • Mobile Configuration ProfilesiPhone Configuration Utility; Creating a Configuration Profile; Installing the Configuration Profile; Updating Profiles; Removing Profiles; Applications and Provisioning Profiles; Mobile Device Management; MDM Network Communication; Lion Server Profile Manager; Setting Up Profile Manager; Creating Settings; Enrolling Devices; Summary; Chapter 3 Encryption; Data Protection; Data Protection API; Attacking Data Protection; Attacking User Passcodes; iPhone Data Protection Tools; Installation Prerequisites; Building the Ramdisk; Booting Ramdisk.
  • Brute-Force Attacking Four-Digit PasscodesDumping Keychain; Dumping Data Partition; Decrypting Data Partition; Summary; Chapter 4 Code Signing and Memory Protections; Understanding Mandatory Access Control; AMFI Hooks; AMFI and execv; How Provisioning Works; Understanding the Provisioning Profile; How the Provisioning File Is Validated; Understanding Application Signing; Inside Entitlements; How Code Signing Enforcement Works; Collecting and Verifying Signing Information; How Signatures Are Enforced on Processes; How the iOS Ensures No Changes Are Made to Signed Pages.
  • Discovering Dynamic Code SigningWhy MobileSafari Is So Special; How the Kernel Handles JIT; Attacking Inside MobileSafari; Breaking Code Signing; Altering iOS Shellcode; Using Meterpreter on iOS; Gaining App Store Approval; Summary; Chapter 5 Sandboxing; Understanding the Sandbox; Sandboxing Your Apps; Understanding the Sandbox Implementation; Understanding User Space Library Implementation; Into the Kernel; Implementing TrustedBSD; Handling Configuration from User Space; Policy Enforcement; How Profile Bytecode Works; How Sandboxing Impacts App Store versus Platform Applications; Summary.
  • Chapter 6 Fuzzing iOS ApplicationsHow Fuzzing Works; The Recipe for Fuzzing; Mutation-Based ("Dumb") Fuzzing; Generation-Based ("Smart") Fuzzing; Submitting and Monitoring the Test Cases; Fuzzing Safari; Choosing an Interface; Generating Test Cases; Testing and Monitoring the Application; Adventures in PDF Fuzzing; Quick Look Fuzzing; Fuzzing with the Simulator; Fuzzing MobileSafari; Selecting the Interface to Fuzz; Generating the Test Case; Fuzzing and Monitoring MobileSafari; PPT Fuzzing Fun; SMS Fuzzing; SMS Basics; Focusing on the Protocol Data Unit Mode; Using PDUspy.