iOS应用安全攻防:英文 东南大学出版社 pdf snb 115盘 kindle 在线 下载 pmlz mobi

iOS应用安全攻防:英文 东南大学出版社精美图片
》iOS应用安全攻防:英文 东南大学出版社电子书籍版权问题 请点击这里查看《

iOS应用安全攻防:英文 东南大学出版社书籍详细信息

  • ISBN:9787564134464
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2012-06
  • 页数:暂无页数
  • 价格:37.70
  • 纸张:胶版纸
  • 装帧:平装-胶订
  • 开本:16开
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分
  • 豆瓣短评:点击查看
  • 豆瓣讨论:点击查看
  • 豆瓣目录:点击查看
  • 读书笔记:点击查看
  • 原文摘录:点击查看

寄语:

新华书店正版,关注店铺成为会员可享店铺专属优惠,团购客户请咨询在线客服!


内容简介:

本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。内容包括:了解黑客如何通过代码注入来使应用感染恶意软件、阻止攻击者劫持SSL会话和窃取数据流量等。


书籍目录:

Preface

1. Everything You Know Is Wrong

The Myth of a Monoculture

The iOS Security Model

Components of the iOS Security Model

Storing the Key with the Lock

Passcodes Equate to Weak Security

Forensic Data Trumps Encryption

External Data Is at Risk, Too

Hijacking Traffic

Data Can Be Stolen...Quickly

Trust No One, Not Even Your Application

Physical Access Is Optional

Summary

Part Ⅰ. Hacking

2. The Basics of Compromising iOS

Why It's Important to Learn How to Break Into a Device

Jailbreaking Explained

Developer Tools

End User Jailbreaks

Jailbreaking an iPhone

DFU Mode

Tethered Versus Untethered

Compromising Devices and Injecting Code

Building Custom Code

Analyzing Your Binary

Testing Your Binary

Daemon!zing Code

Deploying Malicious Code with a Tar Archive

Deploying Malicious Code with a RAM Disk

Exercises

Summary

3. Stealing the Filesystem

Full Disk Encryption

Solid State NAND

Disk Encryption

Where lOS Disk Encryption Has Failed You

Copying the Live Filesystem

The DataTheft Payload

Customizing launchd

Preparing the RAM disk

Imaging the Filesystem

Copying the Raw Filesystem

The RawTheft Payload

Customizing launchd

Preparing the RAM disk

Imaging the Filesystem

Exercises

The Role of Social Engineering

Disabled Device Decoy

Deactivated Device Decoy

Malware Enabled Decoy

Password Engineering Application

Summary

4. Forensic Trace and Data Leakage

Extracting Image Geotags

Consolidated GPS Cache

SQLite Databases

Connecting to a Database

SQLite Built-in Commands

Issuing SQL Queries

Important Database Files

Address Book Contacts

Address Book Images

Google Maps Data

Calendar Events

Call History

Email Database

Notes

Photo Metadata

SMS Messages

Safari Bookmarks

SMS Spotlight Cache

Safari Web Caches

Web Application Cache

WebKit Storage

Voicemail

Reverse Engineering Remnant Database Fields

SMS Drafts

Property Lists

Important Property List Files

Other Important Files

Summary

5. Defeating Encryption

Sogeti's Data Protection Tools

Installing Data Protection Tools

Building the Brute Forcer

Building Needed Python Libraries

Extracting Encryption Keys

The KeyTheft Payload

Customizing Launchd

Preparing the RAM disk

Preparing the Kernel

Executing the Brute Force

Decrypting the Keychain

Decrypting Raw Disk

Decrypting iTunes Backups

Defeating Encryption Through Spyware

The SpyTheft Payload

Daemonizing spyd

Customizing Launchd

Preparing the RAM disk

Executing the Payload

Exercises

Summary

6. Unobliterating Files

Scraping the HFS Journal

Carving Empty Space

Commonly Recovered Data

Application Screenshots

Deleted Property Lists

Deleted Voicemail and Voice Recordings

Deleted Keyboard Cache

Photos and Other Personal Information

Summary

7. Manipulating the Runtime

Analyzing Binaries

The Mach-O Format

Introduction to class-dump-z

Symbol Tables

Encrypted Binaries

Calculating Offsets

Dumping Memory

Copy Decrypted Code Back to the File

Resetting the cryptid

Abusing the Runtime with Cycript

Installing Cycript

Using Cycript

Breaking Simple Locks

Replacing Methods

Trawling for Data

Logging Data

More Serious Implications

Exercises

SpringBoard Animations

Call Tapping...Kind Of

Making Screen Shots

Summary

8. Abusingthe Runtime Library

Breaking Objective-C Down

Instance Variables

Methods

Method Cache

Disassembling and Debugging

Eavesdropping

The Underlying Objective-C Framework

Interfacing with Objective-C

Malicious Code Injection

The CodeTheft Payload

Injection Using a Debugger

Injection Using Dynamic Linker Attack

Full Device Infection

Summary

9. Hijacking Traffic

APN Hijacking

Payload Delivery

Removal

Simple Proxy Setup

Attacking SSL

SSLStrip

Paros proxy

Browser Warnings

Attacking Application-Level SSL Validation

The SSLTheft Payload

Hijacking Foundation HTTP Classes

The POSTTheft Payload

Analyzing Data

Driftnet

Building

Running

Exercises

Summary

Part Ⅱ. Securing

10. Implementing Encryption

Password Strength

Beware Random Password Generators

Introduction to Common Crypto

Stateless Operations

Stateful Encryption

Master Key Encryption

Geo-Encryption

Geo-Encryption with Passphrase

Split Server-Side Keys

Securing Memory

Wiping Memory

Public Key Cryptography

Exercises

11. Counter Forensics

Secure File Wiping

DOD 5220.22-M Wiping

Objective-C

Wiping SQLite Records

Keyboard Cache

Randomizing PIN Digits

Application Screenshots

12. Securing the Runtime

Tamper Response

Wipe User Data

Disable Network Access

Report Home

Enable Logging

False Contacts and Kill Switches

Process Trace Checking

Blocking Debuggers

Runtime Class Integrity Checks

Validating Address Space

Inline Functions

Complicating Disassembly

Optimization Flags

Stripping

They're Fun! They Roll! -funroll-loops

Exercises

13. Jailbreak Detection

Sandbox Integrity Check

Filesystem Tests

Existence of Jailbreak Files

Size of/etc/fstab

Evidence of Symbolic Linking

Page Execution Check

14. Next Steps

Thinking Like an Attacker

Other Reverse Engineering Tools

Security Versus Code Management

A Flexible Approach to Security

Other Great Books


作者介绍:

暂无相关内容,正在全力查找中


出版社信息:

暂无出版社相关信息,正在全力查找中!


书籍摘录:

暂无相关书籍摘录,正在全力查找中!



原文赏析:

暂无原文赏析,正在全力查找中!


其它内容:

编辑推荐

如果你是一位具有坚实Objective-C基础的应用开发者,这本《iOS应用安全攻防(影印版)》绝对急你所需——你所在公司的iOS应用被攻击的可能性很大。这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。

这本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。你会从中学到保护你的应用的很好方式,并且意识到像你的对手那样去理解和制定策略是多么重要。本书由扎德尔斯基(Zdziarski, J.)著。



书籍真实打分

  • 故事情节:9分

  • 人物塑造:5分

  • 主题深度:7分

  • 文字风格:8分

  • 语言运用:3分

  • 文笔流畅:6分

  • 思想传递:3分

  • 知识深度:8分

  • 知识广度:6分

  • 实用性:8分

  • 章节划分:3分

  • 结构布局:5分

  • 新颖与独特:6分

  • 情感共鸣:8分

  • 引人入胜:3分

  • 现实相关:7分

  • 沉浸感:3分

  • 事实准确性:4分

  • 文化贡献:4分


网站评分

  • 书籍多样性:8分

  • 书籍信息完全性:8分

  • 网站更新速度:3分

  • 使用便利性:7分

  • 书籍清晰度:5分

  • 书籍格式兼容性:6分

  • 是否包含广告:8分

  • 加载速度:7分

  • 安全性:4分

  • 稳定性:7分

  • 搜索功能:4分

  • 下载便捷性:9分


下载点评

  • 字体合适(617+)
  • 格式多(388+)
  • 书籍完整(248+)
  • 赞(627+)
  • 下载快(221+)
  • 二星好评(649+)
  • 服务好(597+)
  • 无缺页(491+)
  • mobi(131+)
  • 无水印(416+)
  • 强烈推荐(559+)
  • 图书多(430+)
  • 无广告(201+)

下载评价

  • 网友 孔***旋:

    很好。顶一个希望越来越好,一直支持。

  • 网友 冷***洁:

    不错,用着很方便

  • 网友 隗***杉:

    挺好的,还好看!支持!快下载吧!

  • 网友 步***青:

    。。。。。好

  • 网友 孙***夏:

    中评,比上不足比下有余

  • 网友 訾***晴:

    挺好的,书籍丰富

  • 网友 堵***洁:

    好用,支持

  • 网友 石***致:

    挺实用的,给个赞!希望越来越好,一直支持。

  • 网友 汪***豪:

    太棒了,我想要azw3的都有呀!!!

  • 网友 孙***美:

    加油!支持一下!不错,好用。大家可以去试一下哦

  • 网友 索***宸:

    书的质量很好。资源多

  • 网友 寇***音:

    好,真的挺使用的!


随机推荐