web site hit counter Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It - Ebooks PDF Online
Hot Best Seller

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Availability: Ready to download

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates sever If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace


Compare

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates sever If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

44 review for Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

  1. 4 out of 5

    m ko

    This book shows the other side of Apple’s devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin. When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your “precious”. He presents how to jailbreak device, This book shows the other side of Apple’s devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin. When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your “precious”. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic. Book is both rewarding and demanding at the same time. If you are an iOS newbie, you’d better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one. Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won’t be able to follow all exercises.

  2. 5 out of 5

    Janno Teelem

    Some great examples very well explained, but somewhat repetitive and not very practical for most iOS apps.

  3. 5 out of 5

    Matt Garden

    Very informative, with code samples and everything. I'll definitely think about iOS development (and software development generally) differently. Very informative, with code samples and everything. I'll definitely think about iOS development (and software development generally) differently.

  4. 5 out of 5

    Nanda Gopal

  5. 5 out of 5

    Mesut

  6. 5 out of 5

    Greg

  7. 4 out of 5

    Pedro Antunes

  8. 4 out of 5

    Marco Pavan

  9. 4 out of 5

    Obada Ziyadat

  10. 4 out of 5

    Jason Haddix

  11. 5 out of 5

    Sam

  12. 4 out of 5

    Subhajit Das

  13. 4 out of 5

    Levi Brown

  14. 4 out of 5

    Seyhun Akyürek

  15. 4 out of 5

    Jairzinho.Rodriguez

  16. 4 out of 5

    Emanuel

  17. 5 out of 5

    Panos Krimas

  18. 4 out of 5

    Dr. Emin İslam Tatlı

  19. 5 out of 5

    Julio Sueiras

  20. 5 out of 5

    Boris Vidolov

  21. 5 out of 5

    Ashley Fox

  22. 5 out of 5

    Izar Tarandach

  23. 4 out of 5

    Juan Miguel

  24. 5 out of 5

    Ken

  25. 5 out of 5

    Matthew Mcdole

  26. 4 out of 5

    Ayan

  27. 5 out of 5

    Swhitman

  28. 4 out of 5

    Ahmed

  29. 4 out of 5

    Zeno

  30. 5 out of 5

    John

  31. 4 out of 5

    Brian

  32. 4 out of 5

    Optikfluffel

  33. 4 out of 5

    Manohar

  34. 4 out of 5

    Grant

  35. 4 out of 5

    Anaysk Kulkarni

  36. 4 out of 5

    Pat Smith

  37. 4 out of 5

    Ben

  38. 4 out of 5

    Igor Palaguta

  39. 5 out of 5

    Philipp

  40. 5 out of 5

    TinkyWinky TellyTebby

  41. 5 out of 5

    pluton

  42. 4 out of 5

    Giuseppe

  43. 4 out of 5

    Eric Gragsone

  44. 4 out of 5

    Emil

Add a review

Your email address will not be published. Required fields are marked *

Loading...