iOS应用安全攻防:英文 (美)扎德尔斯基 著作 下载 pdf 百度网盘 epub 免费 2025 电子书 mobi 在线

iOS应用安全攻防:英文 (美)扎德尔斯基 著作精美图片
》iOS应用安全攻防:英文 (美)扎德尔斯基 著作电子书籍版权问题 请点击这里查看《

iOS应用安全攻防:英文 (美)扎德尔斯基 著作书籍详细信息

  • ISBN:9787564134464
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2012-06
  • 页数:暂无页数
  • 价格:37.70
  • 纸张:轻型纸
  • 装帧:平装-胶订
  • 开本:16开
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分
  • 豆瓣短评:点击查看
  • 豆瓣讨论:点击查看
  • 豆瓣目录:点击查看
  • 读书笔记:点击查看
  • 原文摘录:点击查看

寄语:

新华书店正版,关注店铺成为会员可享店铺专属优惠,团购客户请咨询在线客服!


内容简介:

本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。内容包括:了解黑客如何通过代码注入来使应用感染恶意软件、阻止攻击者劫持SSL会话和窃取数据流量等。


书籍目录:

Preface

1. Everything You Know Is Wrong

The Myth of a Monoculture

The iOS Security Model

Components of the iOS Security Model

Storing the Key with the Lock

Passcodes Equate to Weak Security

Forensic Data Trumps Encryption

External Data Is at Risk, Too

Hijacking Traffic

Data Can Be Stolen...Quickly

Trust No One, Not Even Your Application

Physical Access Is Optional

Summary

Part Ⅰ. Hacking

2. The Basics of Compromising iOS

Why It's Important to Learn How to Break Into a Device

Jailbreaking Explained

Developer Tools

End User Jailbreaks

Jailbreaking an iPhone

DFU Mode

Tethered Versus Untethered

Compromising Devices and Injecting Code

Building Custom Code

Analyzing Your Binary

Testing Your Binary

Daemon!zing Code

Deploying Malicious Code with a Tar Archive

Deploying Malicious Code with a RAM Disk

Exercises

Summary

3. Stealing the Filesystem

Full Disk Encryption

Solid State NAND

Disk Encryption

Where lOS Disk Encryption Has Failed You

Copying the Live Filesystem

The DataTheft Payload

Customizing launchd

Preparing the RAM disk

Imaging the Filesystem

Copying the Raw Filesystem

The RawTheft Payload

Customizing launchd

Preparing the RAM disk

Imaging the Filesystem

Exercises

The Role of Social Engineering

Disabled Device Decoy

Deactivated Device Decoy

Malware Enabled Decoy

Password Engineering Application

Summary

4. Forensic Trace and Data Leakage

Extracting Image Geotags

Consolidated GPS Cache

SQLite Databases

Connecting to a Database

SQLite Built-in Commands

Issuing SQL Queries

Important Database Files

Address Book Contacts

Address Book Images

Google Maps Data

Calendar Events

Call History

Email Database

Notes

Photo Metadata

SMS Messages

Safari Bookmarks

SMS Spotlight Cache

Safari Web Caches

Web Application Cache

WebKit Storage

Voicemail

Reverse Engineering Remnant Database Fields

SMS Drafts

Property Lists

Important Property List Files

Other Important Files

Summary

5. Defeating Encryption

Sogeti's Data Protection Tools

Installing Data Protection Tools

Building the Brute Forcer

Building Needed Python Libraries

Extracting Encryption Keys

The KeyTheft Payload

Customizing Launchd

Preparing the RAM disk

Preparing the Kernel

Executing the Brute Force

Decrypting the Keychain

Decrypting Raw Disk

Decrypting iTunes Backups

Defeating Encryption Through Spyware

The SpyTheft Payload

Daemonizing spyd

Customizing Launchd

Preparing the RAM disk

Executing the Payload

Exercises

Summary

6. Unobliterating Files

Scraping the HFS Journal

Carving Empty Space

Commonly Recovered Data

Application Screenshots

Deleted Property Lists

Deleted Voicemail and Voice Recordings

Deleted Keyboard Cache

Photos and Other Personal Information

Summary

7. Manipulating the Runtime

Analyzing Binaries

The Mach-O Format

Introduction to class-dump-z

Symbol Tables

Encrypted Binaries

Calculating Offsets

Dumping Memory

Copy Decrypted Code Back to the File

Resetting the cryptid

Abusing the Runtime with Cycript

Installing Cycript

Using Cycript

Breaking Simple Locks

Replacing Methods

Trawling for Data

Logging Data

More Serious Implications

Exercises

SpringBoard Animations

Call Tapping...Kind Of

Making Screen Shots

Summary

8. Abusingthe Runtime Library

Breaking Objective-C Down

Instance Variables

Methods

Method Cache

Disassembling and Debugging

Eavesdropping

The Underlying Objective-C Framework

Interfacing with Objective-C

Malicious Code Injection

The CodeTheft Payload

Injection Using a Debugger

Injection Using Dynamic Linker Attack

Full Device Infection

Summary

9. Hijacking Traffic

APN Hijacking

Payload Delivery

Removal

Simple Proxy Setup

Attacking SSL

SSLStrip

Paros proxy

Browser Warnings

Attacking Application-Level SSL Validation

The SSLTheft Payload

Hijacking Foundation HTTP Classes

The POSTTheft Payload

Analyzing Data

Driftnet

Building

Running

Exercises

Summary

Part Ⅱ. Securing

10. Implementing Encryption

Password Strength

Beware Random Password Generators

Introduction to Common Crypto

Stateless Operations

Stateful Encryption

Master Key Encryption

Geo-Encryption

Geo-Encryption with Passphrase

Split Server-Side Keys

Securing Memory

Wiping Memory

Public Key Cryptography

Exercises

11. Counter Forensics

Secure File Wiping

DOD 5220.22-M Wiping

Objective-C

Wiping SQLite Records

Keyboard Cache

Randomizing PIN Digits

Application Screenshots

12. Securing the Runtime

Tamper Response

Wipe User Data

Disable Network Access

Report Home

Enable Logging

False Contacts and Kill Switches

Process Trace Checking

Blocking Debuggers

Runtime Class Integrity Checks

Validating Address Space

Inline Functions

Complicating Disassembly

Optimization Flags

Stripping

They're Fun! They Roll! -funroll-loops

Exercises

13. Jailbreak Detection

Sandbox Integrity Check

Filesystem Tests

Existence of Jailbreak Files

Size of/etc/fstab

Evidence of Symbolic Linking

Page Execution Check

14. Next Steps

Thinking Like an Attacker

Other Reverse Engineering Tools

Security Versus Code Management

A Flexible Approach to Security

Other Great Books


作者介绍:

暂无相关内容,正在全力查找中


出版社信息:

暂无出版社相关信息,正在全力查找中!


书籍摘录:

暂无相关书籍摘录,正在全力查找中!



原文赏析:

暂无原文赏析,正在全力查找中!


其它内容:

编辑推荐

如果你是一位具有坚实Objective-C基础的应用开发者,这本《iOS应用安全攻防(影印版)》绝对急你所需——你所在公司的iOS应用被攻击的可能性很大。这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。

这本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。你会从中学到保护你的应用的很好方式,并且意识到像你的对手那样去理解和制定策略是多么重要。本书由扎德尔斯基(Zdziarski, J.)著。



书籍真实打分

  • 故事情节:6分

  • 人物塑造:5分

  • 主题深度:4分

  • 文字风格:9分

  • 语言运用:6分

  • 文笔流畅:6分

  • 思想传递:8分

  • 知识深度:4分

  • 知识广度:5分

  • 实用性:4分

  • 章节划分:7分

  • 结构布局:6分

  • 新颖与独特:6分

  • 情感共鸣:3分

  • 引人入胜:5分

  • 现实相关:4分

  • 沉浸感:7分

  • 事实准确性:4分

  • 文化贡献:3分


网站评分

  • 书籍多样性:5分

  • 书籍信息完全性:6分

  • 网站更新速度:3分

  • 使用便利性:5分

  • 书籍清晰度:3分

  • 书籍格式兼容性:5分

  • 是否包含广告:4分

  • 加载速度:8分

  • 安全性:4分

  • 稳定性:8分

  • 搜索功能:3分

  • 下载便捷性:9分


下载点评

  • 中评(151+)
  • 微信读书(340+)
  • 体验满分(634+)
  • 体验好(531+)
  • 无广告(231+)
  • 体验差(294+)
  • 在线转格式(631+)
  • 下载速度快(149+)
  • 体验还行(432+)
  • 愉快的找书体验(315+)
  • 推荐购买(191+)
  • 格式多(668+)
  • 内容齐全(83+)

下载评价

  • 网友 权***颜: ( 2025-01-19 21:07:47 )

    下载地址、格式选择、下载方式都还挺多的

  • 网友 饶***丽: ( 2025-01-26 12:47:34 )

    下载方式特简单,一直点就好了。

  • 网友 后***之: ( 2025-01-27 05:16:05 )

    强烈推荐!无论下载速度还是书籍内容都没话说 真的很良心!

  • 网友 宫***凡: ( 2025-01-22 18:12:32 )

    一般般,只能说收费的比免费的强不少。

  • 网友 居***南: ( 2025-01-22 11:19:02 )

    请问,能在线转换格式吗?

  • 网友 晏***媛: ( 2025-01-06 04:08:59 )

    够人性化!

  • 网友 宓***莉: ( 2025-01-07 19:36:07 )

    不仅速度快,而且内容无盗版痕迹。

  • 网友 习***蓉: ( 2025-01-08 23:29:00 )

    品相完美

  • 网友 屠***好: ( 2025-01-31 02:09:54 )

    还行吧。

  • 网友 方***旋: ( 2025-01-27 18:54:10 )

    真的很好,里面很多小说都能搜到,但就是收费的太多了

  • 网友 益***琴: ( 2025-01-29 19:25:27 )

    好书都要花钱,如果要学习,建议买实体书;如果只是娱乐,看看这个网站,对你来说,是很好的选择。

  • 网友 冷***洁: ( 2025-01-05 17:24:49 )

    不错,用着很方便

  • 网友 通***蕊: ( 2025-01-16 17:30:49 )

    五颗星、五颗星,大赞还觉得不错!~~


随机推荐