下载  >  安全技术  >  网络攻防  > 黑客攻防技术宝典-iOS实战篇 iOS Hackers Handbook [1ed. en]

黑客攻防技术宝典-iOS实战篇 iOS Hackers Handbook [1ed. en] 评分:

黑客攻防技术宝典-iOS实战篇 iOS Hackers Handbook [1ed. en]
Hacker,s Handbook Charlie miller Dionysus blazakis Dino dai zovi Stefan esser Vincenzo lozzo Ralf-Philipp Weinmann WILEY John Wiley Sons, Inc rs indd i 4/16/20125:4850PM iOS Hacker's handbook Published John Wiley &z Sons, Inc 10475C1 oint boulevard www.wiley.com Copyright o 2012 by John wile ons, Inc. Indianapolis, indiana Published simultaneously in Canada ISBN:978-1-118-204122 ISBN:978-1-118-22843-2(ebk) IsBN:978-1-118-24075-5(ebk) ISBN:978-1-118-26554-3(ebk) manufactured in the United States of America 10987654321 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,(978)750-8400, fax(978)646-8600 Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley sons, Inc 111RiverStreetHoboken,Nj07030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or war ranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for amages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further in formation does not mean that the author or the publisher endorses the information the organization or website may provide or recommendations it may make. Further, readers should be aware that Internet websites listed in this work may have changed or disappeared between when this work was written and when it is read For general information on our other products and services please contact our Customer Care Department within the United States at (877)762-2974, outside the United States at (317)572-3993 or fax(317)572-400 Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Not all content that is available in standard print versions of this book may appear or be packaged in all book formats. If you have purchased a version of this book that did not include media that is referenced by or accompanies astandardprintversionyoumayrequestthismediabyvisitinghttp://booksupport.wilcy.comfoR moreinformationaboutWileyproductsvisitusatwww.wiley.com Library of Congress Control Number: 2012934987 Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley Sons, Inc and/or its affiliates, in the United States and other countries, and may not be used without written permission All other trademarks are the property of their respective owners. John Wiley Sons, Inc is not associated with any product or vendor mentioned in this book rs inddⅱ 4/16/20125:48:53PM About the Authors Charlie miller is a principal research consultant at Accuvant Labs. Dr Miller was a Global Network Exploitation Analyst at the National Security Agency (NSA) for 5 years. He was the first person to find a public remote exploit for both the iphone and the gl android phone He has won the cansecWest pwn2Own hacking competition for the last four years in row. He has exploited an iphone via text messages and found code-signing flaws which could introduce malware in iOS. Reporting the latter got him kicked out of the iOS developer program He has authored two information security books and holds a PhD from the University of Notre dame Dionysus Blazakis is a programmer and security researcher specializing in exploit mitigation techniques. He has spoken at multiple security conferences on exploitation mitigations, mitigation by passes, and new methods for vulner ability discovery. Working with Charlie Miller, he developed an iOS exploit for Pwn2own 2011 to win the iPhone exploitation prize. Dionysus also won the 2010 Pwnie Award for Most Innovative Research recognizing his presentation of techniques leveraging a JIT compiler to bypass data execution prevention Dino Dai Zovi, Co-Founder and cto at Trail of Bits, has been working in information security for over a decade with experience in red teaming, penetra- tion testing, software security, information security management, and cybers curity r&D. Dino is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel vT-x virtualization rootkits at conferences around the world including DEFCON, BlackHat, and CanSecWest He is a co-author of the books The Mac Hacker's Handbook(wiley, 2009)and ndo 4/16/20125:48:53PM iv About the authors The Art of Software Security Testing(Addison-Wesley, 2006). He is perhaps best known in the information security and mac communities for winning the first PWN2OWN contest at Can SecWest 2007 Vincenzo lozzo is a security researcher at Tiqad srl He is a regular speaker at various information security conferences including Black Hat and CanSecWest He is perhaps best known in the information security industry for co-writing the exploits for black Berry os and iphone os to win Pwn2own 2010 and pwn2own 2011. He also serves on the review board for black hat and shakacon He tweets at e snagg Stefan Esser is best known in the security community as the php security guy. Since he became a PHP core developer in 2002 he devoted a lot of time to PHP and PHP application vulnerability research. However in his early days he released lots of advisories about vulnerabilities in software like cvs, samba OpenBsD, or Internet Explorer. In 2003 he was the first to boot Linux directly from the harddisk of an unmodified XBoX through a buffer overflow in the XBOX font loader. In 2004 he founded the Hardened-PHP Project to devel more secure version of php known as Hardened-PHP, which evolved into the Suhosin php security system in 2006. Since 2007 he works as head of research and development for the German web application company Sektion Eins gmbH that he co-founded. Since 2010, he is actively researching iOS security topics and in 2011, he supplied the jailbreaking scene with an exploit that survived multiple updates by Apple Ralf-Philipp Weinmann is a postdoctoral researcher at the University of Luxembourg. His research interests in information security are diverse, span ning topics from cryptanalysis to the security of mobile devices. He has been known to be involved in drastic speed-ups of WEP cracking; an analysis of Apple's File Vault; reverse-engineering; breaking proprietary cryptographic algorithms in DECt; and penetrating smartphones, both through web browsers (PWN2OWN), as well as through their gSm stacks. Ralf has studied computer science and completed a ph D in cryptography at the tu darmstadt in germany rs indd it 4/16/20125:48:53PM About the Technical editor Eric McDonald( musclenerd is a Staff engineer at a southern calfornia h-tech firm where he specializes in reverse engineering bioses. He is a mem ber of the iPhone Dev Team, which has been developing free iphone jailbreaks and carrier unlocks since the first iphone in 2007. He was previously involved in hacking the first two generations of TiVo hardware and was technical editor of Hacking the Tivo, 2nd Edition Course Technolog y ptr, 2004. Originally from the Boston area, he holds S B and S M. degrees from M.I.T. rs indd v 4/16/20125:48:53PM Credits Acquisitions editor Production Manager Carol long Tim Tate Project Editor Vice President and executive yaney Argenta Group Publisher Richard wadley Technical Editor Eric McDonald Vice president and executive Publisher Production editor Neil edde Kathleen wisor Associate publisher Copy editor Jim mintel Kim cofer Project Coordinator, Cover Editorial Manager Katie Crocker Mary Beth Wakefield Proofreader Freelancer Editorial Manager Nancy Carrasco Rosemarie graham Indexer Associate Director of Marketing ewis David mayhew Cover Image Marketing Manager Ryan Sneed Ashley zurcher Cover Designer Business manager C Sawayasu Tsuji/ iStockPhoto Amy Knies ndo 4/16/20125:48:53PM Acknowledgments I'd like to thank my wife, Andrea, for her continuous love and support, as well as my two boys, Theo and Levi, members of the next generation of iOS hackers and jailbreakers Charlie First, Id like to thank alayna, Simon, and Oliver for their patience and love over the months I spent working at night after getting home. Id also like to acknowledge the huge amount of work the jailbreak community has produced. In addition to the professional jailbreaks they produce, they've also made a security researchers job much easier through documentation, such as the iPhone wiki and tools for the extraction and modification of ioS firmware I'd like to thank my parents, sister, and close valuable friends for their continual support, especially during the time that I was working on this book. Without them, I'd have gone crazy long ago. Id also like to thank the iOS jailbreak devel oper community for performing great technical research and releasing their tools freely, often with full source code. Finally, Id like to acknowledge pablo and Paco for their help on my previous book Dino ndo 4/16/20125:48:53PM viii Acknowledgments I'a like to thank my parents, my brother, and all my close friends, who sup ported me and my sometimes crazy ideas throughout my whole life. especially I want to thank Nami, who is my soulmate for many years now Stefan I'a like to thank everyone, both in my personal and professional world, who helped me down this bumpy road; you are definitely too many to be named here. A special thanks to Naike and Max, who put up with me while writing the chapters of this book Vincenzo Id like to thank the women in my life; for they had to suffer the hardship of my abandoning them for the machines while writing i would like to thank Thomas Dullien, Joshua Lackey and Harald Welte for many enlightening discussions and comments during my months of baseband research in 2010. a big thank you to Jacob Appelbaum for bringing me into contact with the engineer who triggered the subject to be researched. There are people to be thanked who prefer to be nameless: you know who you are; thanks for everything! Last but not least I would like to praise the work of the iphone dev team. many things wouldve been much harder without their work. Especially MuscleNerd and planetbeing were very helpful when i got stuck with the iPhone4 and roxfan deserves mad props for providing me with his scatter-loading script Ralf ndo 4/16/20125:48:53PM

...展开详情
2017-08-26 上传 大小:4.75MB
举报 收藏
分享
黑客攻防技术宝典-iOS实战篇

黑客攻防技术宝典-iOS实战篇

立即下载
黑客攻防技术宝典:iOS实战篇

黑客攻防技术宝典:iOS实战篇

立即下载
黑客攻防技术宝典_iOS实战篇(源码)

iOS Hacker's Handbook 的中文翻译版,对于想了解苹果系统越狱和ios系统攻击的朋友有帮助.

立即下载
黑客攻防技术

pdf格式 黑客攻防技术电子书 阅读方便

立即下载
黑客攻防PPT黑客攻防PPT黑客攻防PPT黑客攻防PPT

关于网路安全,手把手教会你做一个黑客!!!

立即下载
黑客攻防技术 解读黑客

网络攻击 网络防护 黑客手册 菜鸟手册 用于对网络中级学者使用,分析网络问题,教程如何使用几种木马.安全破解技巧,入侵攻击方法,防入侵检测,计算机网络安全漏洞及补丁说明

立即下载
黑客攻防技术宝典

黑客攻防技术宝典--Web实战篇,信息安全人员必读之书

立即下载
黑客攻防技术秘笈

介绍黑客的攻防技术:1.必须掌握的基础知识 2.Windows系统漏洞攻防 3.局域网攻防 4.网页攻防 5.提升系统安全性能

立即下载
黑客联盟之黑客攻防技术指导

黑客联盟之黑客攻防技术指导,主要讲解了黑客的一般攻击手法的操作步骤和实战。对于想学习黑客技术的人非常有用。

立即下载
黑客攻防技术内幕全书

黑客攻防技术内幕全书,简单实用。 黑客攻防技术内幕全书,简单实用。 黑客攻防技术内幕全书,简单实用。

立即下载
黑客攻防技术宝典 PDF

黑客攻防技术宝典,Web实战篇,系统实战篇,PDF,完整

立即下载
黑客攻防技术内幕.CHM

黑客攻防技术内幕.CHM

立即下载
狙击黑客——黑客攻防技术见招拆招

狙击黑客——黑客攻防技术见招拆招 -01.rar

立即下载
[常用黑客攻防技术大全

《常用黑客攻防技术大全》由浅入深地讲解了黑客攻击和防范的具体方法和技巧,通过具体形象的案例介绍,向读者展示了多种攻防方法和攻防工具的使用。全书共14章,分别介绍Windows黑客基础、黑客工具使用、木马攻击与防御、软件汇编和解密、溢出原理和防御、QQ攻防战、密码学攻防、拒绝服务攻击及其防御、Google语法和Google Hacking、网页脚本攻击、网站攻击与防御、服务器与脚本安全和个人电脑的安全防护等内容。《常用黑客攻防技术大全》以清晰明朗的思路和图文并茂的形式,引导读者分析和防范黑客入侵,从而加强计算机安全意识。《常用黑客攻防技术大全》适合多个层次的网络用户阅读,不仅可以作为网络安全人员

立即下载
黑客攻防指南 黑客攻防指南

黑客攻防指南 黑客攻防指南 黑客攻防指南黑客攻防指南黑客攻防指南黑客攻防指南黑客攻防指南

立即下载
黑客攻防指南黑客攻防指南

黑客攻防指南黑客攻防指南黑客攻防指南黑客攻防指南黑客攻防指南黑客攻防指南

立即下载
网络安全 黑客攻防技术

这是常用的一些网络扫描,监听,嗅探工具,可以用来提升自己对网络安全的认识,学习之用。不能有非法用途,本人不承担任何后果

立即下载
html+css+js制作的一个动态的新年贺卡

该代码是http://blog.csdn.net/qq_29656961/article/details/78155792博客里面的代码,代码里面有要用到的图片资源和音乐资源。

立即下载
概率论与数理统计

《概率论与数理统计》内容包括初等概率计算、随机变量及其分布、数字特征、多维随机向量、极限定理、统计学基本概念、点估计与区间估计、假设检验、回归相关分析、方差分析等。书中选入了部分在理论和应用上重要,但一般认为超出本课程范围的材料,以备教者和学者选择。《概率论与数理统计》着重基本概念的阐释,同时,在设定的数学程度内,力求做到论述严谨。书中精选了百余道习题,并在书末附有提示与解答。《概率论与数理统计》可作为高等学校理工科非数学系的概率统计课程教材,也可供具有相当数学准备(初等微积分及少量矩阵知识)的读者自修之用。

立即下载
Camtasia 9安装及破解方法绝对有效

附件中注册方法亲测有效,加以整理与大家共享。 由于附件大于60m传不上去,另附Camtasia 9百度云下载地址。免费自取 链接:http://pan.baidu.com/s/1kVABnhH 密码:xees

立即下载