Atnaujinkite slapukų nuostatas

El. knyga: iOS Penetration Testing: A Definitive Guide to iOS Security

  • Formatas: PDF+DRM
  • Išleidimo metai: 09-Dec-2016
  • Leidėjas: APress
  • Kalba: eng
  • ISBN-13: 9781484223550
  • Formatas: PDF+DRM
  • Išleidimo metai: 09-Dec-2016
  • Leidėjas: APress
  • Kalba: eng
  • ISBN-13: 9781484223550

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a concise, deep dive into iOS Security, including all the tools and methods to master reverse engineering of iOS apps and penetration testing.

iOS Penetration Testing covers the most significant attacks threatening iOS applications in recent times. The readers will also learn methods of patching iOS applications to make payment transactions and personal data sharing more secure. 


What you will learn:

• Get a deeper understanding of iOS Infrastructure and Architecture
• Obtain deep insights of iOS Security and Jailbreaking
• Learn Reverse Engineering techniques for securing your iOS Apps
• Learn the basics of Application Development for iOS
• Security Best Practices of iOS applications

Who is this book for:

The target audience of this book will be the Security Professionals, information
Security analysts, iOS Reverse Engineers , iOS Developers and readers interested in secure application development in iOS.


About the Author xiii
About the Technical Reviewer xv
Acknowledgments xvii
Introduction xix
Chapter 1 Introduction to iOS
1(12)
iOS Introduction
1(7)
Security History
2(1)
Code Signing
2(1)
Data Execution Prevention (DEP)
3(1)
Address Space Layout Randomization (ASLR)
3(1)
Sandbox
3(1)
iOS Boot Procedure
4(1)
Updates
5(1)
What's New?
6(1)
System Insight
7(1)
iOS System Hierarchy
8(3)
Applications
9(1)
Library
9(1)
Bin Folder
10(1)
Dev Directory
10(1)
Lib Folder
10(1)
Sbin Directory
10(1)
Tmp Directory
10(1)
Developer Directory
10(1)
System Directory
10(1)
Boot Directory
11(1)
Etc Directory
11(1)
mnt Directory
11(1)
usr Directory
11(1)
var Directory
11(1)
User Directory
11(1)
Private Directory
11(1)
iOS Application Overview
11(1)
Summary
12(1)
Chapter 2 iOS App Development Basics
13(18)
Introduction to Objective-C and Swift
13(3)
Objective-C Runtime
13(1)
Basic Terminology in Objective-C
14(1)
Object Creation
15(1)
Data Types
15(1)
Methods
16(1)
Instance Methods
16(1)
Class Methods
17(1)
Introduction to Swift
17(3)
Swift Runtime
18(1)
Compatibility with Objective-C
18(1)
Stored Properties
18(1)
Classes and Methods
19(1)
Structures
20(1)
Introduction to Xcode
20(2)
Getting Started with Xcode
21(1)
Cocoa Framework
22(1)
CocoaPods
22(1)
Hello World with Swift
23(6)
iOS Application Architecture
29(1)
Summary
30(1)
Chapter 3 iOS App Vulnerabilities and Jailbreaking
31(16)
Introduction to Security and Vulnerabilities in iOS
31(4)
What Is Jailbreaking?
31(1)
Jailbreaking iOS
32(2)
SSHing in iOS
34(1)
Installing the Tools
35(5)
Installing class-dump
35(1)
Installing the libimobiledevice Library
36(1)
Installing Cycript
37(1)
Setting Up a Proxy
38(1)
Installing Keychain Dumper
38(2)
Common iOS Vulnerabilities
40(5)
Buffer Overflows
40(1)
Invalidated Input
41(2)
Privilege Escalation
43(1)
Insecure Data Storage
43(1)
Insecure Transport Layer
43(1)
Client-Side Injection
44(1)
Weakness in Authentication and Authorization
45(1)
Summary
45(2)
Chapter 4 Blackbox Testing iOS Apps
47(26)
Intercepting Network Traffic
47(6)
Defeating User Validation
53(8)
Damn Vulnerable iOS App: DVIA
54(7)
Performing Runtime Analysis
61(11)
Summary
72(1)
Chapter 5 iOS Security Toolkit
73(24)
Advance Reverse Engineering
73(6)
A Day in the Life of a Debugger
79(12)
Debugging in Xcode
80(11)
Bypassing Jailbreak Detection
91(4)
Summary
95(2)
Chapter 6 Automating App Testing
97(22)
idb: Simplify Penetration Test
97(6)
iRET: iOS Reverse Engineering Toolkit
103(7)
Tweaking the Development
110(8)
Summary
118(1)
Chapter 7 iOS App Security Practices
119(12)
Storage in iOS
119(1)
Data Storage Security
120(2)
Transport Layer Security
122(3)
Certificate Pinning
123(2)
Anti-Debugging Protections
125(1)
Secure Development Guidelines
126(3)
Untrusted Data
126(1)
Session Management
127(1)
Data Storage
127(1)
Geolocation Handling
127(1)
Escape Classic C Attacks
127(1)
Transport Layer
128(1)
Closing Thoughts
129(2)
Index 131
A Security Researcher and Penetration Tester, Kunal Relan is a Cisco Certified Network Associate in Security. He is also a founder of Pentest Ninja, an Automated SQLi and XSS tool for Mozilla Firefox. Kunal has published Research Papers in ACM , Indias biggest Technology Journal. He regularly speaks on Security at Indias leading Institutes such as IIT. Kunal currently works as an Information Security Analyst and Mobile Application Penetration Tester for Aarvee Idealabs, India.