Book description
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.
This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.
- Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
- Learn how attackers infect apps with malware through code injection
- Discover how attackers defeat iOS keychain and data-protection encryption
- Use a debugger and custom code injection to manipulate the runtime Objective-C environment
- Prevent attackers from hijacking SSL sessions and stealing traffic
- Securely delete files and design your apps to prevent forensic data leakage
- Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
Table of contents
- Dedication
- A Note Regarding Supplemental Files
- Preface
- 1. Everything You Know Is Wrong
-
I. Hacking
-
2. The Basics of Compromising iOS
- Why It’s Important to Learn How to Break Into a Device
- Jailbreaking Explained
- End User Jailbreaks
- Compromising Devices and Injecting Code
- Exercises
- Summary
- 3. Stealing the Filesystem
-
4. Forensic Trace and Data Leakage
- Extracting Image Geotags
-
SQLite Databases
- Connecting to a Database
- SQLite Built-in Commands
- Issuing SQL Queries
- Important Database Files
- Address Book Contacts
- Address Book Images
- Google Maps Data
- Calendar Events
- Call History
- Email Database
- Notes
- Photo Metadata
- SMS Messages
- Safari Bookmarks
- SMS Spotlight Cache
- Safari Web Caches
- Web Application Cache
- WebKit Storage
- Voicemail
- Reverse Engineering Remnant Database Fields
- SMS Drafts
- Property Lists
- Other Important Files
- Summary
- 5. Defeating Encryption
- 6. Unobliterating Files
- 7. Manipulating the Runtime
- 8. Abusing the Runtime Library
- 9. Hijacking Traffic
-
2. The Basics of Compromising iOS
- II. Securing
- About the Author
- Copyright
Product information
- Title: Hacking and Securing iOS Applications
- Author(s):
- Release date: January 2012
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781449318741
You might also like
book
The Rules of Programming
This philosophy-of-programming guide presents a unique and entertaining take on how to think about programming. A …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Take Control of the Mac Command Line with Terminal, 3rd Edition
Learn how to unleash your inner Unix geek! Version 3.2.1, updated December 23, 2022 Release your …
book
Effective Java, 3rd Edition
Since this Jolt-award winning classic was last updated in 2008, the Java programming environment has changed …