iOS Hacker's Handbook

iOS Hacker's Handbook

Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo

Discover all of the defense hazards and exploits that may threaten iOS-based cellular devices

iOS is Apple's cellular working process for the iPhone and iPad. With the creation of iOS5, many safeguard matters have come to mild. This booklet explains and discusses all of them. The award-winning writer workforce, specialists in Mac and iOS protection, examines the vulnerabilities and the internals of iOS to teach how assaults may be mitigated. The e-book explains how the working process works, its total protection structure, and the protection hazards linked to it, in addition to exploits, rootkits, and different payloads constructed for it.

  • Covers iOS protection structure, vulnerability searching, make the most writing, and the way iOS jailbreaks work
  • Explores iOS firm and encryption, code signing and reminiscence security, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation
  • Companion site contains resource code and instruments to help you efforts

iOS Hacker's Handbook palms you with the instruments had to establish, comprehend, and foil iOS attacks.

Show sample text content

Download sample