万本电子书0元读

万本电子书0元读

顶部广告

Learning iOS Penetration Testing电子书

售       价:¥

2人正在读 | 0人评论 9.8

作       者:Swaroop Yermalkar

出  版  社:Packt Publishing

出版时间:2016-01-07

字       数:23.9万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them with the help of this example-driven guideAcquire the key skills that will easily help you to perform iOS exploitation and forensics with greater confidence and a stronger understandingWho This Book Is ForThis book is for IT security professionals who want to conduct security testing of applications. This book will give you exposure to diverse tools to perform penetration testing. This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting.What You Will LearnUnderstand the basics of iOS app development, deployment, security architecture, application signing, application sandboxing, and OWASP TOP 10 for mobileSet up your lab for iOS app pentesting and identify sensitive information stored locallyPerform traffic analysis of iOS devices and catch sensitive data being leaked by side channelsModify an application’s behavior using runtime analysisAnalyze an application’s binary for security protectionAcquire the knowledge required for exploiting iOS devicesLearn the basics of iOS forensicsIn DetailiOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This book will show you how to conduct a wide range of penetration tests on iOS devices to uncover vulnerabilities and strengthen the system from attacks.Learning iOS Penetration Testing discusses the common vulnerabilities and security-related shortcomings in an iOS application and operating system, and will teach you to conduct static and dynamic analysis of iOS applications.This practical guide will help you uncover vulnerabilities in iOS phones and applications. We begin with basics of iOS security and dig deep to learn about traffic analysis, code analysis, and various other techniques. Later, we discuss the various utilities, and the process of reversing and auditing.Style and approachThis fast-paced and practical guide takes a step-by-step approach to penetration testing with the goal of helping you secure your iOS devices and apps quickly.
目录展开

Learning iOS Penetration Testing

Table of Contents

Learning iOS Penetration Testing

Credits

Foreword – Why Mobile Security Matters

About the Author

About the Reviewer

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Downloading the color images of this book

Errata

Piracy

Questions

1. Introducing iOS Application Security

Basics of iOS and application development

Developing your first iOS app

Running apps on iDevice

iOS MVC design

iOS security model

iOS secure boot chain

iOS application signing

iOS application sandboxing

OWASP Top 10 Mobile Risks

Weak server-side controls

Insecure data storage

Insufficient transport layer protection

Side channel data leakage

Poor authorization and authentication

Broken cryptography

Client-side injection

Security decisions via untrusted input

Improper session handling

Lack of binary protections

Summary

2. Setting up Lab for iOS App Pentesting

Need for jailbreaking

What is jailbreak?

Types of jailbreaks

Hardware and software requirements

Jailbreaking iDevice

Adding sources to Cydia

Connecting with iDevice

Transferring files to iDevice

Connecting to iDevice using VNC

Installing utilities on iDevice

Installing idb tool

Installing apps on iDevice

Pentesting using iOS Simulator

Summary

3. Identifying the Flaws in Local Storage

Introduction to insecure data storage

Installing third-party applications

Insecure data in the plist files

Insecure storage in the NSUserDefaults class

Insecure storage in SQLite database

SQL injection in iOS applications

Insecure storage in Core Data

Insecure storage in keychain

Summary

4. Traffic Analysis for iOS Application

Intercepting traffic over HTTP

Intercepting traffic over HTTPS

Intercepting traffic of iOS Simulator

Web API attack demo

Bypassing SSL pinning

Summary

5. Sealing up Side Channel Data Leakage

Data leakage via application screenshot

Pasteboard leaking sensitive information

Device logs leaking application sensitive data

Keyboard cache capturing sensitive data

Summary

6. Analyzing iOS Binary Protections

Decrypting unsigned iOS applications

Decrypting signed iOS applications

Analyzing code by reverse engineering

Analyzing iOS binary

Hardening binary against reverse engineering

Summary

7. The iOS App Dynamic Analysis

Understanding Objective-C runtime

Dynamic analysis using Cycript

Runtime analysis using Snoop-it

Dynamic analysis on iOS Simulator

Summary

8. iOS Exploitation

Setting up exploitation lab

Shell bind TCP for iOS

Shell reverse TCP for iOS

Creating iOS backdoor

Converting iDevice to a pentesting device

Summary

9. Introducing iOS Forensics

Basics of iOS forensics

The iPhone hardware

The iOS filesystem

Physical acquisition

Data backup acquisition

iOS forensics tools walkthrough

Elcomsoft iOS Forensic Toolkit (EIFT)

Open source and free tools

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部