舉報

會員
Learning iOS Penetration Testing
最新章節:
Index
ThisbookisforITsecurityprofessionalswhowanttoconductsecuritytestingofapplications.Thisbookwillgiveyouexposuretodiversetoolstoperformpenetrationtesting.ThisbookwillalsoappealtoiOSdeveloperswhowouldliketosecuretheirapplications,aswellassecurityprofessionals.ItiseasytofollowforanyonewithoutexperienceofiOSpentesting.
目錄(86章)
倒序
- 封面
- 版權頁
- Credits
- Foreword – Why Mobile Security Matters
- About the Author
- About the Reviewer
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introducing iOS Application Security
- Basics of iOS and application development
- Developing your first iOS app
- Running apps on iDevice
- iOS MVC design
- iOS security model
- iOS secure boot chain
- iOS application signing
- iOS application sandboxing
- OWASP Top 10 Mobile Risks
- Summary
- Chapter 2. Setting up Lab for iOS App Pentesting
- Need for jailbreaking
- Jailbreaking iDevice
- Connecting with iDevice
- Installing utilities on iDevice
- Installing apps on iDevice
- Pentesting using iOS Simulator
- Summary
- Chapter 3. Identifying the Flaws in Local Storage
- Introduction to insecure data storage
- Installing third-party applications
- Insecure data in the plist files
- Insecure storage in the NSUserDefaults class
- Insecure storage in SQLite database
- SQL injection in iOS applications
- Insecure storage in Core Data
- Insecure storage in keychain
- Summary
- Chapter 4. Traffic Analysis for iOS Application
- Intercepting traffic over HTTP
- Intercepting traffic over HTTPS
- Intercepting traffic of iOS Simulator
- Web API attack demo
- Bypassing SSL pinning
- Summary
- Chapter 5. Sealing up Side Channel Data Leakage
- Data leakage via application screenshot
- Pasteboard leaking sensitive information
- Device logs leaking application sensitive data
- Keyboard cache capturing sensitive data
- Summary
- Chapter 6. Analyzing iOS Binary Protections
- Decrypting unsigned iOS applications
- Decrypting signed iOS applications
- Analyzing code by reverse engineering
- Analyzing iOS binary
- Hardening binary against reverse engineering
- Summary
- Chapter 7. The iOS App Dynamic Analysis
- Understanding Objective-C runtime
- Dynamic analysis using Cycript
- Runtime analysis using Snoop-it
- Dynamic analysis on iOS Simulator
- Summary
- Chapter 8. iOS Exploitation
- Setting up exploitation lab
- Shell bind TCP for iOS
- Shell reverse TCP for iOS
- Creating iOS backdoor
- Converting iDevice to a pentesting device
- Summary
- Chapter 9. Introducing iOS Forensics
- Basics of iOS forensics
- The iPhone hardware
- The iOS filesystem
- Physical acquisition
- Data backup acquisition
- iOS forensics tools walkthrough
- Summary
- Index 更新時間:2021-07-23 14:49:41
推薦閱讀
- Embedded Linux Projects Using Yocto Project Cookbook
- TypeScript Essentials
- NLTK基礎教程:用NLTK和Python庫構建機器學習應用
- AngularJS Web Application Development Blueprints
- Instant QlikView 11 Application Development
- Python機器學習實戰
- 概率成形編碼調制技術理論及應用
- 網站構建技術
- Asynchronous Android Programming(Second Edition)
- Tableau 10 Bootcamp
- jQuery炫酷應用實例集錦
- 西門子S7-200 SMART PLC編程從入門到實踐
- Programming with CodeIgniterMVC
- Node.js 6.x Blueprints
- JavaEE架構與程序設計
- JavaScript Mobile Application Development
- Expert Cube Development with SSAS Multidimensional Models
- 秒懂算法:用常識解讀數據結構與算法
- 微信小程序開發
- C#大學實用教程
- SignalR Blueprints
- 基于Eclipse平臺的JSP應用教程(第2版)
- 研發質量保障與工程效率
- 零基礎學Python(第2版)
- ASP.NET Core MVC 2.0 Cookbook
- HTML+CSS網頁開發技術精解
- JavaScript and JSON Essentials
- On Java:中文版·基礎卷
- Python編程基礎(中學版)
- Hibernate逍遙游記