悦读宝库 -iOS应用安全攻防:英文 (美)扎德尔斯基 著作
本书资料更新时间:2025-01-19 20:33:30

iOS应用安全攻防:英文 (美)扎德尔斯基 著作 下载 pdf 百度网盘 epub 免费 2025 电子书 mobi 在线

iOS应用安全攻防:英文 (美)扎德尔斯基 著作精美图片
》iOS应用安全攻防:英文 (美)扎德尔斯基 著作电子书籍版权问题 请点击这里查看《

iOS应用安全攻防:英文 (美)扎德尔斯基 著作书籍详细信息

  • ISBN:9787564134464
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2012-06
  • 页数:暂无页数
  • 价格:37.70
  • 纸张:轻型纸
  • 装帧:平装-胶订
  • 开本:16开
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分
  • 豆瓣短评:点击查看
  • 豆瓣讨论:点击查看
  • 豆瓣目录:点击查看
  • 读书笔记:点击查看
  • 原文摘录:点击查看
  • 更新时间:2025-01-19 20:33:30

寄语:

新华书店正版,关注店铺成为会员可享店铺专属优惠,团购客户请咨询在线客服!


内容简介:

本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。内容包括:了解黑客如何通过代码注入来使应用感染恶意软件、阻止攻击者劫持SSL会话和窃取数据流量等。


书籍目录:

Preface

1. Everything You Know Is Wrong

The Myth of a Monoculture

The iOS Security Model

Components of the iOS Security Model

Storing the Key with the Lock

Passcodes Equate to Weak Security

Forensic Data Trumps Encryption

External Data Is at Risk, Too

Hijacking Traffic

Data Can Be Stolen...Quickly

Trust No One, Not Even Your Application

Physical Access Is Optional

Summary

Part Ⅰ. Hacking

2. The Basics of Compromising iOS

Why It's Important to Learn How to Break Into a Device

Jailbreaking Explained

Developer Tools

End User Jailbreaks

Jailbreaking an iPhone

DFU Mode

Tethered Versus Untethered

Compromising Devices and Injecting Code

Building Custom Code

Analyzing Your Binary

Testing Your Binary

Daemon!zing Code

Deploying Malicious Code with a Tar Archive

Deploying Malicious Code with a RAM Disk

Exercises

Summary

3. Stealing the Filesystem

Full Disk Encryption

Solid State NAND

Disk Encryption

Where lOS Disk Encryption Has Failed You

Copying the Live Filesystem

The DataTheft Payload

Customizing launchd

Preparing the RAM disk

Imaging the Filesystem

Copying the Raw Filesystem

The RawTheft Payload

Customizing launchd

Preparing the RAM disk

Imaging the Filesystem

Exercises

The Role of Social Engineering

Disabled Device Decoy

Deactivated Device Decoy

Malware Enabled Decoy

Password Engineering Application

Summary

4. Forensic Trace and Data Leakage

Extracting Image Geotags

Consolidated GPS Cache

SQLite Databases

Connecting to a Database

SQLite Built-in Commands

Issuing SQL Queries

Important Database Files

Address Book Contacts

Address Book Images

Google Maps Data

Calendar Events

Call History

Email Database

Notes

Photo Metadata

SMS Messages

Safari Bookmarks

SMS Spotlight Cache

Safari Web Caches

Web Application Cache

WebKit Storage

Voicemail

Reverse Engineering Remnant Database Fields

SMS Drafts

Property Lists

Important Property List Files

Other Important Files

Summary

5. Defeating Encryption

Sogeti's Data Protection Tools

Installing Data Protection Tools

Building the Brute Forcer

Building Needed Python Libraries

Extracting Encryption Keys

The KeyTheft Payload

Customizing Launchd

Preparing the RAM disk

Preparing the Kernel

Executing the Brute Force

Decrypting the Keychain

Decrypting Raw Disk

Decrypting iTunes Backups

Defeating Encryption Through Spyware

The SpyTheft Payload

Daemonizing spyd

Customizing Launchd

Preparing the RAM disk

Executing the Payload

Exercises

Summary

6. Unobliterating Files

Scraping the HFS Journal

Carving Empty Space

Commonly Recovered Data

Application Screenshots

Deleted Property Lists

Deleted Voicemail and Voice Recordings

Deleted Keyboard Cache

Photos and Other Personal Information

Summary

7. Manipulating the Runtime

Analyzing Binaries

The Mach-O Format

Introduction to class-dump-z

Symbol Tables

Encrypted Binaries

Calculating Offsets

Dumping Memory

Copy Decrypted Code Back to the File

Resetting the cryptid

Abusing the Runtime with Cycript

Installing Cycript

Using Cycript

Breaking Simple Locks

Replacing Methods

Trawling for Data

Logging Data

More Serious Implications

Exercises

SpringBoard Animations

Call Tapping...Kind Of

Making Screen Shots

Summary

8. Abusingthe Runtime Library

Breaking Objective-C Down

Instance Variables

Methods

Method Cache

Disassembling and Debugging

Eavesdropping

The Underlying Objective-C Framework

Interfacing with Objective-C

Malicious Code Injection

The CodeTheft Payload

Injection Using a Debugger

Injection Using Dynamic Linker Attack

Full Device Infection

Summary

9. Hijacking Traffic

APN Hijacking

Payload Delivery

Removal

Simple Proxy Setup

Attacking SSL

SSLStrip

Paros proxy

Browser Warnings

Attacking Application-Level SSL Validation

The SSLTheft Payload

Hijacking Foundation HTTP Classes

The POSTTheft Payload

Analyzing Data

Driftnet

Building

Running

Exercises

Summary

Part Ⅱ. Securing

10. Implementing Encryption

Password Strength

Beware Random Password Generators

Introduction to Common Crypto

Stateless Operations

Stateful Encryption

Master Key Encryption

Geo-Encryption

Geo-Encryption with Passphrase

Split Server-Side Keys

Securing Memory

Wiping Memory

Public Key Cryptography

Exercises

11. Counter Forensics

Secure File Wiping

DOD 5220.22-M Wiping

Objective-C

Wiping SQLite Records

Keyboard Cache

Randomizing PIN Digits

Application Screenshots

12. Securing the Runtime

Tamper Response

Wipe User Data

Disable Network Access

Report Home

Enable Logging

False Contacts and Kill Switches

Process Trace Checking

Blocking Debuggers

Runtime Class Integrity Checks

Validating Address Space

Inline Functions

Complicating Disassembly

Optimization Flags

Stripping

They're Fun! They Roll! -funroll-loops

Exercises

13. Jailbreak Detection

Sandbox Integrity Check

Filesystem Tests

Existence of Jailbreak Files

Size of/etc/fstab

Evidence of Symbolic Linking

Page Execution Check

14. Next Steps

Thinking Like an Attacker

Other Reverse Engineering Tools

Security Versus Code Management

A Flexible Approach to Security

Other Great Books


作者介绍:

暂无相关内容,正在全力查找中


出版社信息:

暂无出版社相关信息,正在全力查找中!


书籍摘录:

暂无相关书籍摘录,正在全力查找中!



原文赏析:

暂无原文赏析,正在全力查找中!


其它内容:

编辑推荐

如果你是一位具有坚实Objective-C基础的应用开发者,这本《iOS应用安全攻防(影印版)》绝对急你所需——你所在公司的iOS应用被攻击的可能性很大。这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。

这本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。你会从中学到保护你的应用的很好方式,并且意识到像你的对手那样去理解和制定策略是多么重要。本书由扎德尔斯基(Zdziarski, J.)著。



书籍真实打分

  • 故事情节:6分

  • 人物塑造:5分

  • 主题深度:9分

  • 文字风格:5分

  • 语言运用:4分

  • 文笔流畅:3分

  • 思想传递:8分

  • 知识深度:3分

  • 知识广度:6分

  • 实用性:6分

  • 章节划分:9分

  • 结构布局:3分

  • 新颖与独特:5分

  • 情感共鸣:6分

  • 引人入胜:4分

  • 现实相关:3分

  • 沉浸感:4分

  • 事实准确性:7分

  • 文化贡献:9分


网站评分

  • 书籍多样性:6分

  • 书籍信息完全性:5分

  • 网站更新速度:6分

  • 使用便利性:8分

  • 书籍清晰度:6分

  • 书籍格式兼容性:9分

  • 是否包含广告:6分

  • 加载速度:4分

  • 安全性:3分

  • 稳定性:6分

  • 搜索功能:8分

  • 下载便捷性:3分


下载点评

  • 无缺页(134+)
  • 排版满分(203+)
  • 格式多(57+)
  • mobi(613+)
  • 实惠(274+)
  • 还行吧(662+)
  • 无颠倒(657+)

下载评价

  • 网友 石***致: ( 2025-01-03 23:02:10 )

    挺实用的,给个赞!希望越来越好,一直支持。

  • 网友 仰***兰: ( 2025-01-05 22:46:46 )

    喜欢!很棒!!超级推荐!

  • 网友 冷***洁: ( 2024-12-28 23:37:31 )

    不错,用着很方便

  • 网友 汪***豪: ( 2024-12-21 09:55:03 )

    太棒了,我想要azw3的都有呀!!!

  • 网友 温***欣: ( 2024-12-27 02:29:09 )

    可以可以可以

  • 网友 蓬***之: ( 2024-12-26 10:39:24 )

    好棒good

  • 网友 芮***枫: ( 2025-01-09 01:36:42 )

    有点意思的网站,赞一个真心好好好 哈哈

  • 网友 敖***菡: ( 2025-01-09 10:32:13 )

    是个好网站,很便捷

  • 网友 寿***芳: ( 2025-01-13 18:28:03 )

    可以在线转化哦

  • 网友 常***翠: ( 2025-01-16 23:43:36 )

    哈哈哈哈哈哈

  • 网友 曹***雯: ( 2025-01-15 16:50:05 )

    为什么许多书都找不到?

  • 网友 国***舒: ( 2025-01-02 17:20:33 )

    中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到


随机推荐