Cargando…

Learning iOS penetration testing : secure your iOS applications and uncover hidden vunerabilities by conducting penetration tests /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Yermalkar, Swaroop (Autor)
Otros Autores: Peterson, Gunnar (author of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2016.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn936042574
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160126s2016 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d IDEBK  |d OCLCF  |d N$T  |d YDXCP  |d VT2  |d COO  |d DEBBG  |d OCLCQ  |d OCLCO  |d Z5A  |d OCLCQ  |d UOK  |d CEF  |d MQY  |d AGLDB  |d IGB  |d RDF  |d EMU  |d OCLCO  |d OCLCQ  |d QGK 
019 |a 934607420  |a 1259264120 
020 |a 9781785886799  |q (electronic bk.) 
020 |a 1785886797  |q (electronic bk.) 
020 |a 1785883259  |q (Trade Paper) 
020 |a 9781785883255  |q (Trade Paper) 
020 |z 9781785883255 
024 3 |a 9781785883255 
029 1 |a DEBBG  |b BV043968737 
029 1 |a DEBSZ  |b 485792478 
029 1 |a GBVCP  |b 88284847X 
029 1 |a AU@  |b 000062539943 
029 1 |a AU@  |b 000066232755 
029 1 |a AU@  |b 000066533587 
029 1 |a AU@  |b 000067107888 
029 1 |a AU@  |b 000058630281 
035 |a (OCoLC)936042574  |z (OCoLC)934607420  |z (OCoLC)1259264120 
037 |a CL0500000707  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 014000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Yermalkar, Swaroop,  |e author. 
245 1 0 |a Learning iOS penetration testing :  |b secure your iOS applications and uncover hidden vunerabilities by conducting penetration tests /  |c Swaroop Yermalkar ; foreword by Gunnar Peterson. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed May 3, 2016). 
500 |a Includes index. 
520 8 |a Annotation  |b Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This Book Achieve your goal to secure iOS devices and applications with the help of this fast paced manual Find vulnerabilities in your iOS applications and fix them with the help of this example-driven guide Acquire the key skills that will easily help you to perform iOS exploitation and forensics with greater confidence and a stronger understandingWho This Book Is ForThis book is for IT security professionals who want to conduct security testing of applications. This book will give you exposure to diverse tools to perform penetration testing. This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting. What You Will Learn Understand the basics of iOS app development, deployment, security architecture, application signing, application sandboxing, and OWASP TOP 10 for mobile Set up your lab for iOS app pentesting and identify sensitive information stored locally Perform traffic analysis of iOS devices and catch sensitive data being leaked by side channels Modify an application's behavior using runtime analysis Analyze an application's binary for security protection Acquire the knowledge required for exploiting iOS devices Learn the basics of iOS forensicsIn DetailiOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This book will show you how to conduct a wide range of penetration tests on iOS devices to uncover vulnerabilities and strengthen the system from attacks. Learning iOS Penetration Testing discusses the common vulnerabilities and security-related shortcomings in an iOS application and operating system, and will teach you to conduct static and dynamic analysis of iOS applications. This practical guide will help you uncover vulnerabilities in iOS phones and applications. We begin with basics of iOS security and dig deep to learn about traffic analysis, code analysis, and various other techniques. Later, we discuss the various utilities, and the process of reversing and auditing. Style and approachThis fast-paced and practical guide takes a step-by-step approach to penetration testing with the goal of helping you secure your iOS devices and apps quickly. 
505 0 |a Cover; Copyright; Credits; Foreword -- Why MobileSecurity Matters; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing iOS Application Security; Basics of iOS and application development; Developing your first iOS app; Running apps on iDevice; iOS MVC design; iOS security model; iOS secure boot chain; iOS application signing; iOS application sandboxing; OWASP Top 10 Mobile Risks; Weak server-side controls; Insecure data storage; Insufficient transport layer protection; Side channel data leakage; Poor authorization and authentication 
505 8 |a Broken cryptographyClient-side injection; Security decisions via untrusted input; Improper session handling; Lack of binary protections; Summary; Chapter 2: Setting up Lab for iOS App Pentesting; Need for jailbreaking; What is jailbreak?; Types of jailbreaks; Hardware and software requirements; Jailbreaking iDevice; Adding sources to Cydia; Connecting with iDevice; Transferring files to iDevice; Connecting to iDevice using VNC; Installing utilities on iDevice; Installing idb tool; Installing apps on iDevice; Pentesting using iOS Simulator; Summary 
505 8 |a Chapter 3: Identifying the Flaws in Local StorageIntroduction to insecure data storage; Installing third-party applications; Insecure data in the plist files; Insecure storage in the NSUserDefaults class; Insecure storage in SQLite database; SQL injection in iOS applications; Insecure storage in Core Data; Insecure storage in keychain; Summary; Chapter 4: Traffic Analysis for iOS Application; Intercepting traffic over HTTP; Intercepting traffic over HTTPS; Intercepting traffic of iOS Simulator; Web API attack demo; Bypassing SSL pinning; Summary 
505 8 |a Chapter 5: Sealing up Side Channel Data LeakageData leakage via application screenshot; Pasteboard leaking sensitive information; Device logs leaking application sensitive data; Keyboard cache capturing sensitive data; Summary; Chapter 6: Analyzing iOS Binary Protections; Decrypting unsigned iOS applications; Decrypting signed iOS applications; Analyzing code by reverse engineering; Analyzing iOS binary; Hardening binary against reverse engineering; Summary; Chapter 7: The iOS App Dynamic Analysis; Understanding Objective-C runtime; Dynamic analysis using Cycript 
505 8 |a Runtime analysis using Snoop-itDynamic analysis on iOS Simulator; Summary; Chapter 8: iOS Exploitation; Setting up exploitation lab; Shell bind TCP for iOS; Shell reverse TCP for iOS; Creating iOS backdoor; Converting iDevice to a pentesting device; Summary; Chapter 9: Introducing iOS Forensics; Basics of iOS forensics; The iPhone hardware; The iOS filesystem; Physical acquisition; Data backup acquisition; iOS forensics tools walkthrough; Elcomsoft iOS Forensic Toolkit (EIFT); Open source and free tools; Summary; Index 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a iOS (Electronic resource) 
630 0 7 |a IOS (Electronic resource)  |2 fast  |0 (OCoLC)fst01784820 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
700 1 |a Peterson, Gunnar,  |e author of foreword. 
776 |z 1-78588-325-9 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781785883255/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 1140117 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis33518423 
938 |a YBP Library Services  |b YANK  |n 12798303 
994 |a 92  |b IZTAP