skip to content
IOS Hacker's Handbook. Preview this item
ClosePreview this item
Checking...

IOS Hacker's Handbook.

Author: Charlie MillerDion BlazakisDino DaiZoviStefan EsserVincenzo IozzoAll authors
Publisher: New York : Wiley, 2012.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Charlie Miller; Dion Blazakis; Dino DaiZovi; Stefan Esser; Vincenzo Iozzo; Ralf-Philip Weinmann
ISBN: 9781118240755 1118240758 9781118265543 1118265548 9781118228432 111822843X
OCLC Number: 815648715
Description: 1 online resource (410 pages)
Contents: IOS Hacker's Handbook; Contents; Chapter 1 iOS Security Basics; iOS Hardware/Device Types; How Apple Protects the App Store; Understanding Security Threats; Understanding iOS Security Architecture; The Reduced Attack Surface; The Stripped-Down iOS; Privilege Separation; Code Signing; Data Execution Prevention; Address Space Layout Randomization; Sandboxing; A Brief History of iOS Attacks; Libtiff; Fun with SMS; The Ikee Worm; Storm8; SpyPhone; Pwn2Own 2010; Jailbreakme.com 2 ("Star"); Jailbreakme.com 3 ("Saffron"); Summary; Chapter 2 iOS in the Enterprise; iOS Configuration Management. Mobile Configuration ProfilesiPhone Configuration Utility; Creating a Configuration Profile; Installing the Configuration Profile; Updating Profiles; Removing Profiles; Applications and Provisioning Profiles; Mobile Device Management; MDM Network Communication; Lion Server Profile Manager; Setting Up Profile Manager; Creating Settings; Enrolling Devices; Summary; Chapter 3 Encryption; Data Protection; Data Protection API; Attacking Data Protection; Attacking User Passcodes; iPhone Data Protection Tools; Installation Prerequisites; Building the Ramdisk; Booting Ramdisk. Brute-Force Attacking Four-Digit PasscodesDumping Keychain; Dumping Data Partition; Decrypting Data Partition; Summary; Chapter 4 Code Signing and Memory Protections; Understanding Mandatory Access Control; AMFI Hooks; AMFI and execv; How Provisioning Works; Understanding the Provisioning Profile; How the Provisioning File Is Validated; Understanding Application Signing; Inside Entitlements; How Code Signing Enforcement Works; Collecting and Verifying Signing Information; How Signatures Are Enforced on Processes; How the iOS Ensures No Changes Are Made to Signed Pages. Discovering Dynamic Code SigningWhy MobileSafari Is So Special; How the Kernel Handles JIT; Attacking Inside MobileSafari; Breaking Code Signing; Altering iOS Shellcode; Using Meterpreter on iOS; Gaining App Store Approval; Summary; Chapter 5 Sandboxing; Understanding the Sandbox; Sandboxing Your Apps; Understanding the Sandbox Implementation; Understanding User Space Library Implementation; Into the Kernel; Implementing TrustedBSD; Handling Configuration from User Space; Policy Enforcement; How Profile Bytecode Works; How Sandboxing Impacts App Store versus Platform Applications; Summary. Chapter 6 Fuzzing iOS ApplicationsHow Fuzzing Works; The Recipe for Fuzzing; Mutation-Based ("Dumb") Fuzzing; Generation-Based ("Smart") Fuzzing; Submitting and Monitoring the Test Cases; Fuzzing Safari; Choosing an Interface; Generating Test Cases; Testing and Monitoring the Application; Adventures in PDF Fuzzing; Quick Look Fuzzing; Fuzzing with the Simulator; Fuzzing MobileSafari; Selecting the Interface to Fuzz; Generating the Test Case; Fuzzing and Monitoring MobileSafari; PPT Fuzzing Fun; SMS Fuzzing; SMS Basics; Focusing on the Protocol Data Unit Mode; Using PDUspy.

Abstract:

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/815648715> # IOS Hacker's Handbook.
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "815648715" ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nyu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/326750667#CreativeWork/ios_electronic_resource> ; # IOS (Electronic resource)
    schema:about <http://experiment.worldcat.org/entity/work/data/326750667#Topic/application_software_security_measures> ; # Application software--Security measures
    schema:about <http://dewey.info/class/005.8/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh95009362> ; # Application software--Development
    schema:about <http://experiment.worldcat.org/entity/work/data/326750667#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://id.worldcat.org/fast/1046289> ; # Operating systems (Computers)--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/326750667#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/326750667#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/326750667#Topic/operating_systems_computers_security_measures> ; # Operating systems (Computers)--Security measures
    schema:about <http://id.worldcat.org/fast/811707> ; # Application software--Development
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/326750667#Person/iozzo_vincenzo> ; # Vincenzo Iozzo
    schema:contributor <http://experiment.worldcat.org/entity/work/data/326750667#Person/weinmann_ralf_philip> ; # Ralf-Philip Weinmann
    schema:contributor <http://viaf.org/viaf/64649390> ; # Stefan Esser
    schema:contributor <http://viaf.org/viaf/2645149068360765730002> ; # Dion Blazakis
    schema:contributor <http://viaf.org/viaf/8872149068428165730007> ; # Dino DaiZovi
    schema:copyrightYear "2012" ;
    schema:creator <http://viaf.org/viaf/265689293> ; # Charlie Miller
    schema:datePublished "2012" ;
    schema:description "IOS Hacker's Handbook; Contents; Chapter 1 iOS Security Basics; iOS Hardware/Device Types; How Apple Protects the App Store; Understanding Security Threats; Understanding iOS Security Architecture; The Reduced Attack Surface; The Stripped-Down iOS; Privilege Separation; Code Signing; Data Execution Prevention; Address Space Layout Randomization; Sandboxing; A Brief History of iOS Attacks; Libtiff; Fun with SMS; The Ikee Worm; Storm8; SpyPhone; Pwn2Own 2010; Jailbreakme.com 2 ("Star"); Jailbreakme.com 3 ("Saffron"); Summary; Chapter 2 iOS in the Enterprise; iOS Configuration Management."@en ;
    schema:description "Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/326750667> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/326750667#CreativeWork/> ;
    schema:name "IOS Hacker's Handbook."@en ;
    schema:productID "815648715" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/815648715#PublicationEvent/new_york_wiley_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/326750667#Agent/wiley> ; # Wiley
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=821875> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=518572> ;
    schema:url <https://safarijv.auth0.com/authorize?client_id=UtNi1m1IRXgzYFIwZrhSxell9EDRaL2v&response_type=code&connection=glasgow-caledonian-university&redirect_uri=https://www.safaribooksonline.com/complete/auth0-oauth2/&state=/library/view/-/9781118240755/?ar> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=821875> ;
    schema:url <https://www.dawsonera.com/guard/protected/dawson.jsp?name=https://idp.shu.ac.uk/shibboleth&dest=http://www.dawsonera.com/abstract/9781118228432> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=46155> ;
    schema:url <http://rbdigital.oneclickdigital.com> ;
    schema:workExample <http://worldcat.org/isbn/9781118228432> ;
    schema:workExample <http://worldcat.org/isbn/9781118240755> ;
    schema:workExample <http://worldcat.org/isbn/9781118265543> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/815648715> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#CreativeWork/ios_electronic_resource> # IOS (Electronic resource)
    a schema:CreativeWork ;
    schema:name "IOS (Electronic resource)" ;
    schema:name "iOS (Electronic resource)" ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Person/iozzo_vincenzo> # Vincenzo Iozzo
    a schema:Person ;
    schema:familyName "Iozzo" ;
    schema:givenName "Vincenzo" ;
    schema:name "Vincenzo Iozzo" ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Person/weinmann_ralf_philip> # Ralf-Philip Weinmann
    a schema:Person ;
    schema:familyName "Weinmann" ;
    schema:givenName "Ralf-Philip" ;
    schema:name "Ralf-Philip Weinmann" ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Topic/application_software_security_measures> # Application software--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh90001980> ;
    schema:name "Application software--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/326750667#Topic/operating_systems_computers_security_measures> # Operating systems (Computers)--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh85094982> ;
    schema:name "Operating systems (Computers)--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh95009362> # Application software--Development
    a schema:Intangible ;
    schema:name "Application software--Development"@en ;
    .

<http://id.worldcat.org/fast/1046289> # Operating systems (Computers)--Security measures
    a schema:Intangible ;
    schema:name "Operating systems (Computers)--Security measures"@en ;
    .

<http://id.worldcat.org/fast/811707> # Application software--Development
    a schema:Intangible ;
    schema:name "Application software--Development"@en ;
    .

<http://viaf.org/viaf/2645149068360765730002> # Dion Blazakis
    a schema:Person ;
    schema:familyName "Blazakis" ;
    schema:givenName "Dion" ;
    schema:name "Dion Blazakis" ;
    .

<http://viaf.org/viaf/265689293> # Charlie Miller
    a schema:Person ;
    schema:familyName "Miller" ;
    schema:givenName "Charlie" ;
    schema:name "Charlie Miller" ;
    .

<http://viaf.org/viaf/64649390> # Stefan Esser
    a schema:Person ;
    schema:familyName "Esser" ;
    schema:givenName "Stefan" ;
    schema:name "Stefan Esser" ;
    .

<http://viaf.org/viaf/8872149068428165730007> # Dino DaiZovi
    a schema:Person ;
    schema:familyName "DaiZovi" ;
    schema:givenName "Dino" ;
    schema:name "Dino DaiZovi" ;
    .

<http://worldcat.org/isbn/9781118228432>
    a schema:ProductModel ;
    schema:isbn "111822843X" ;
    schema:isbn "9781118228432" ;
    .

<http://worldcat.org/isbn/9781118240755>
    a schema:ProductModel ;
    schema:isbn "1118240758" ;
    schema:isbn "9781118240755" ;
    .

<http://worldcat.org/isbn/9781118265543>
    a schema:ProductModel ;
    schema:isbn "1118265548" ;
    schema:isbn "9781118265543" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.