舉報

會員
Learning iOS Penetration Testing
最新章節:
Index
ThisbookisforITsecurityprofessionalswhowanttoconductsecuritytestingofapplications.Thisbookwillgiveyouexposuretodiversetoolstoperformpenetrationtesting.ThisbookwillalsoappealtoiOSdeveloperswhowouldliketosecuretheirapplications,aswellassecurityprofessionals.ItiseasytofollowforanyonewithoutexperienceofiOSpentesting.
目錄(86章)
倒序
- 封面
- 版權頁
- Credits
- Foreword – Why Mobile Security Matters
- About the Author
- About the Reviewer
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introducing iOS Application Security
- Basics of iOS and application development
- Developing your first iOS app
- Running apps on iDevice
- iOS MVC design
- iOS security model
- iOS secure boot chain
- iOS application signing
- iOS application sandboxing
- OWASP Top 10 Mobile Risks
- Summary
- Chapter 2. Setting up Lab for iOS App Pentesting
- Need for jailbreaking
- Jailbreaking iDevice
- Connecting with iDevice
- Installing utilities on iDevice
- Installing apps on iDevice
- Pentesting using iOS Simulator
- Summary
- Chapter 3. Identifying the Flaws in Local Storage
- Introduction to insecure data storage
- Installing third-party applications
- Insecure data in the plist files
- Insecure storage in the NSUserDefaults class
- Insecure storage in SQLite database
- SQL injection in iOS applications
- Insecure storage in Core Data
- Insecure storage in keychain
- Summary
- Chapter 4. Traffic Analysis for iOS Application
- Intercepting traffic over HTTP
- Intercepting traffic over HTTPS
- Intercepting traffic of iOS Simulator
- Web API attack demo
- Bypassing SSL pinning
- Summary
- Chapter 5. Sealing up Side Channel Data Leakage
- Data leakage via application screenshot
- Pasteboard leaking sensitive information
- Device logs leaking application sensitive data
- Keyboard cache capturing sensitive data
- Summary
- Chapter 6. Analyzing iOS Binary Protections
- Decrypting unsigned iOS applications
- Decrypting signed iOS applications
- Analyzing code by reverse engineering
- Analyzing iOS binary
- Hardening binary against reverse engineering
- Summary
- Chapter 7. The iOS App Dynamic Analysis
- Understanding Objective-C runtime
- Dynamic analysis using Cycript
- Runtime analysis using Snoop-it
- Dynamic analysis on iOS Simulator
- Summary
- Chapter 8. iOS Exploitation
- Setting up exploitation lab
- Shell bind TCP for iOS
- Shell reverse TCP for iOS
- Creating iOS backdoor
- Converting iDevice to a pentesting device
- Summary
- Chapter 9. Introducing iOS Forensics
- Basics of iOS forensics
- The iPhone hardware
- The iOS filesystem
- Physical acquisition
- Data backup acquisition
- iOS forensics tools walkthrough
- Summary
- Index 更新時間:2021-07-23 14:49:41
推薦閱讀
- NLTK基礎教程:用NLTK和Python庫構建機器學習應用
- 實用防銹油配方與制備200例
- PyTorch Artificial Intelligence Fundamentals
- R語言游戲數據分析與挖掘
- INSTANT Sinatra Starter
- Android移動開發案例教程:基于Android Studio開發環境
- Hands-On Nuxt.js Web Development
- UI設計全書(全彩)
- Hands-On Full Stack Development with Spring Boot 2.0 and React
- Python Interviews
- GitHub入門與實踐
- Advanced UFT 12 for Test Engineers Cookbook
- jQuery從入門到精通(微課精編版)
- Web前端開發最佳實踐
- Swift High Performance
- Hadoop Blueprints
- Flutter for Beginners
- Building an E-Commerce Application with MEAN
- 匯編語言程序設計
- Lucene 4 Cookbook
- HTML 5與CSS 3權威指南(第3版·下冊)
- Hands-On Android UI Development
- Node Cookbook
- Appcelerator Titanium Business Application Development Cookbook
- 網絡安全Java代碼審計實戰
- 劍指大數據:企業級數據倉庫項目實戰(金融租賃版)
- Akka Cookbook
- Mastering AWS Development
- Unity 3.x Game Development by Example Beginner's Guide
- Python深度學習