| 价格 | ¥59.00 |
| 发货 | 广东东莞市 |
| 数量 | -+ |
| 库存 | 100本 |
如果你是一位具有坚实Objective-C基础的应用开发者,这本《iOS应用安全攻防(影印版)》急你所需——你所在公司的iOS应用被攻击的可能性很大。这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。
这本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。你会从中学到保护你的应用的方式,并且意识到像你的对手那样去理解和制定策略是多么重要。
Preface
1.Everything You Know Is Wrong
The Myth of a Monoculture
The iOS Security Model
Components of the iOS Security Model
Storing the Key with the Lock
Passcodes Equate to Weak Security
Fotensic Data Trumps Encryption
External Dara Is at Risk, Too
Hij acking Traffic
Data Can Be Stolen...Quickly
Trust No One, Not Even Your Application
Physical Access Is Optional
Summary
PartⅠ. Hacking
2.The Basics of(omprornising iOS
Why It's important to Learn How to Break Into a Device
Jailbreaking Explained
Developer Tools
End User Jailbreaks
Jailbreaking an iPhone
DFU Mode
Tethered Versus Untethered
Compromising Devices and Injecting Code
Building Custom Code
Analyzing Your Binary
TestingYourBinary
Daemonizing Codey
Deploying Malicious Code with a Tar Archive
Deploying Malicious Code with a RAM Disk
Exercises
Summary
3.StealingtheFilesystem
Full Disk Encryption
Solid State NAND
Disk Encryption
Where iOS Disk Encryption Has Failed You
Copying the Live Filesystem
The DataTheft Payload
Customizing launchd
Preparing the RAM disk
Imaging the Filesystem
Copying the Raw Filesystem
The RawTheft Payload
Customizing launchd
Preparing the RAM disk
Imaging the Filesystem
Exercises
The Role of Soaal Engineering
Disabled Device Decoy
Deacrivated Device Decoy
Malware Enabled Decoy
Password Engineering Application
Summary
4.ForensicTraceand Data Leakage
Extracring Image Geotags
Consolidated GPS Cache
SQLite Databases
Connecting to a Database
SQLite Built-in Commands
Issuing SQL Queries
important Database Files
Address Book Contacts
Address Book Images
Google Maps Data
Calendar Events
Call History
Email Database
Notes
……
PartⅡ. Securing