fbpx

[email protected]

购物车

 查看订单

  • 我的帐户
东东购 | EasternEast
  • 中文书店
    • 畅销排行榜
      • 小说 畅销榜
      • 童书 畅销榜
      • 外语畅销榜
      • 管理畅销榜
      • 法律畅销榜
      • 青春文学畅销榜
    • 热门分类
      • 社会小说
      • 成功/励志 畅销榜
      • 人物传记
      • 大陆原创
      • 绘本童书
      • 影视小说
    • 文学推荐
      • 文集
      • 戏剧
      • 纪实文学
      • 名家作品
      • 民间文学
      • 中国现当代随笔
    • 新书热卖榜
      • 小说 新书热卖榜
      • 青春文学 新书热卖榜
      • 童书 新书热卖榜
      • 管理 新书热卖榜
      • 成功/励志 新书热卖榜
      • 艺术 新书热卖榜
  • 精选分类
    • 小说
    • 保健养生
    • 烹饪/美食
    • 风水/占卜
    • 青春文学
    • 童书
    • 管理
    • 成功/励志
    • 文学
    • 哲学/宗教
    • 传记
    • 投资理财
    • 亲子家教
    • 动漫/幽默
    • 法律 Legal
    • 经济 Economics
    • 所有分类
  • 关于东东
  • 帮我找书
搜索
首页计算机/网络信息安全iOS应用安全攻防(影印版)

iOS应用安全攻防(影印版)

作者:(美)扎德尔斯基 著 出版社:东南大学出版社 出版时间:2012年06月 

ISBN: 9787564134464
年中特卖用“SALE15”折扣卷全场书籍85折!可与三本88折,六本78折的优惠叠加计算!全球包邮!
trust badge

EUR €38.99

类别: 信息安全 SKU:5d8485835f984910454168dc 库存: 有现货
  • 描述
  • 评论( 0 )

描述

开 本: 16开纸 张: 胶版纸包 装: 平装是否套装: 否国际标准书号ISBN: 9787564134464

内容简介

    
如果你是一位具有坚实Objective-C基础的应用开发者,这本《iOS应用安全攻防(影印版)》*急你所需——你所在公司的iOS应用被攻击的可能性很大。这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。
这本书讲解了几种iOS的攻击手段,以及黑客们常用的工具和技术。你会从中学到保护你的应用的*方式,并且意识到像你的对手那样去理解和制定策略是多么重要。本书由扎德尔斯基(Zdziarski,
J.)著。

目  录
Preface
1. Everything You Know Is Wrong
  The Myth of a Monoculture
  The iOS Security Model
  Components of the iOS Security Model
  Storing the Key with the Lock
  Passcodes Equate to Weak Security
  Foreic Data Trumps Encryption
  External Data Is at Risk, Too
  Hijacking Traffic
  Data Can Be Stolen...Quickly
  Trust No One, Not Even Your Application
  Physical Access Is Optional
  Summary
Part Ⅰ. Hacking
2. The Basics of Compromising iOS
  Why It's Important to Learn How to Break Into a Device
  Jailbreaking Explained
  Developer Tools
  End User Jailbreaks
  Jailbreaking an iPhone
  DFU Mode
  Tethered Veus Untethered
  Compromising Devices and Injecting Code
  Building Custom Code
  Analyzing Your Binary
  Testing Your Binary
  Daemon!zing Code
  Deploying Malicious Code with a Tar Archive
  Deploying Malicious Code with a RAM Disk
  Exercises
  Summary
3. Stealing the Filesystem
  Full Disk Encryption
  Solid State NAND
  Disk Encryption
  Where lOS Disk Encryption Has Failed You
  Copying the Live Filesystem
  The DataTheft Payload
  Customizing launchd
  Preparing the RAM disk
  Imaging the Filesystem
  Copying the Raw Filesystem
  The RawTheft Payload
  Customizing launchd
  Preparing the RAM disk
  Imaging the Filesystem
  Exercises
  The Role of Social Engineering
  Disabled Device Decoy
  Deactivated Device Decoy
  Malware Enabled Decoy
  Password Engineering Application
  Summary
4. Foreic Trace and Data Leakage
  Extracting Image Geotags
  Coolidated GPS Cache
  SQLite Databases
  Connecting to a Database
  SQLite Built-in Commands
  Issuing SQL Queries
  Important Database Files
  Address Book Contacts
  Address Book Images
  Google Maps Data
  Calendar Events
  Call History
  Email Database
  Notes
  Photo Metadata
  SMS Messages
  Safari Bookmarks
  SMS Spotlight Cache
  Safari Web Caches
  Web Application Cache
  WebKit Storage
  Voicemail
  Revee Engineering Remnant Database Fields
  SMS Drafts
  Property Lists
  Important Property List Files
  Other Important Files
  Summary
5. Defeating Encryption
  Sogeti's Data Protection Tools
  Italling Data Protection Tools
  Building the Brute Forcer
  Building Needed Python Libraries
  Extracting Encryption Keys
  The KeyTheft Payload
  Customizing Launchd
  Preparing the RAM disk
  Preparing the Kernel
  Executing the Brute Force
  Decrypting the Keychain
  Decrypting Raw Disk
  Decrypting iTunes Backups
  Defeating Encryption Through Spyware
  The SpyTheft Payload
  Daemonizing spyd
  Customizing Launchd
  Preparing the RAM disk
  Executing the Payload
  Exercises
  Summary
6. Unobliterating Files
  Scraping the HFS Journal
  Carving Empty Space
  Commonly Recovered Data
  Application Screehots
  Deleted Property Lists
  Deleted Voicemail and Voice Recordings
  Deleted Keyboard Cache
  Photos and Other Peonal Information
  Summary
7. Manipulating the Runtime
  Analyzing Binaries
  The Mach-O Format
  Introduction to class-dump-z
  Symbol Tables
  Encrypted Binaries
  Calculating Offsets
  Dumping Memory
  Copy Decrypted Code Back to the File
  Resetting the cryptid
  Abusing the Runtime with Cycript
  Italling Cycript
  Using Cycript
  Breaking Simple Locks
  Replacing Methods
  Trawling for Data
  Logging Data
  More Serious Implicatio
  Exercises
  SpringBoard Animatio
  Call Tapping...Kind Of
  Making Screen Shots
  Summary
8. Abusingthe Runtime Library
  Breaking Objective-C Down
  Itance Variables
  Methods
  Method Cache
  Disassembling and Debugging
  Eavesdropping
  The Underlying Objective-C Framework
  Interfacing with Objective-C
  Malicious Code Injection
  The CodeTheft Payload
  Injection Using a Debugger
  Injection Using Dynamic Linker Attack
  Full Device Infection
  Summary
9. Hijacking Traffic
  APN Hijacking
  Payload Delivery
  Removal
  Simple Proxy Setup
  Attacking SSL
  SSLStrip
  Paros proxy
  Browser Warnings
  Attacking Application-Level SSL Validation
  The SSLTheft Payload
  Hijacking Foundation HTTP Classes
  The POSTTheft Payload
  Analyzing Data
  Driftnet
  Building
  Running
  Exercises
  Summary
Part Ⅱ. Securing
10. Implementing Encryption
  Password Strength
  Beware Random Password Generato
  Introduction to Common Crypto
  Stateless Operatio
  Stateful Encryption
  Master Key Encryption
  Geo-Encryption
  Geo-Encryption with Passphrase
  Split Server-Side Keys
  Securing Memory
  Wiping Memory
  Public Key Cryptography
  Exercises
11. Counter Foreics
  Secure File Wiping
  DOD 5220.22-M Wiping
  Objective-C
  Wiping SQLite Records
  Keyboard Cache
  Randomizing PIN Digits
  Application Screehots
12. Securing the Runtime
  Tamper Respoe
  Wipe User Data
  Disable Network Access
  Report Home
  Enable Logging
  False Contacts and Kill Switches
  Process Trace Checking
  Blocking Debugge
  Runtime Class Integrity Checks
  Validating Address Space
  Inline Functio
  Complicating Disassembly
  Optimization Flags
  Stripping
  They're Fun! They Roll! -funroll-loops
  Exercises
13. Jailbreak Detection
  Sandbox Integrity Check
  Filesystem Tests
  Existence of Jailbreak Files
  Size of/etc/fstab
  Evidence of Symbolic Linking
  Page Execution Check
14. Next Steps
  Thinking Like an Attacker
  Other Revee Engineering Tools
  Security Veus Code Management
  A Flexible Approach to Security
  Other Great Books

抢先评论了 “iOS应用安全攻防(影印版)” 取消回复

评论

还没有评论。

相关产品

加入购物车

图解密码技术 第3版

EUR €53.99
加入购物车

网络安全法与网络安全等级保护制度培训教程(2018版)

EUR €48.99
加入购物车

安全简史——从隐私保护到量子密码

EUR €43.99
加入购物车

Metasploit渗透测试魔鬼训练营(首本中文原创Metasploit渗透测试著作!国内信息安全领域布道者和Metasploit渗透测试专家领衔撰写。)

EUR €53.99

东东购的宗旨是服务喜爱阅读中文书籍的海外人民,提供一个完善的购书平台,让国人不论何时何地都能沉浸在书香之中,读着熟悉的中文字,回忆着家乡的味道。


安全加密结账 安心网络购物 支持Paypal付款

常见问题

  • 货物配送
  • 退换货政策
  • 隐私政策
  • 联盟营销

客户服务

  • 联系东东
  • 关于东东
  • 帮我找书
  • 货物追踪
  • 会员登入

订阅最新的优惠讯息和书籍资讯

选择币别

EUR
USD
CAD
AUD
NZD
NOK
GBP
CHF
SEK
CNY
UAH
ILS
SAR
MXN
KRW
MYR
SGD
HUF
TRY
JPY
HKD
TWD
facebookinstagram
©2020 东东购 EasternEast.com

限时特卖:用“SALE15”优惠券全场书籍85折!可与三本88折,六本78折的优惠叠加计算。 忽略