作者:empty 页数:410 出版社:empty |
No part of this publication maybe reproduced, stored in a retrieval system or transmitted in any fermorby any means.electron k, mechanical p holo copying, recording scanning or otherwise, exo epta sperm i ledsion of the Publish et, or authorization through payment of the appropriate per-copy fee to the Copyright111RiverSIreet Hoboken.NJ 07130.201) 746-6011, fax(201) 748-6008,oronlineathtcp://wwv.wlley-Limit of Liability/DiselaimerofWarranty:Thepublisherandtheauthormakenorepresenationsorwar-warranties, in chu ding without limitation warranties of fitness for a particular purpose.No warranty maybefender in gk gaL accounting or other professional service klf professional aseistancrnsrequined.the perv ionsdime ged arising here from The fact that an organization or Web sife is referred to in this work as aci lationand/or a potential source of further information does not mean that the author or the publisher endorsesthe info e mation the organization or web sile may p to video r to commendations it may make.Further.readersshould be aware that Inte met webs tess ted in this work may have changed ords appeared between whenthis work was written and wh mn it is readFor general info emaio non our other products and services please contact our Cu some r Care Departmen lwithin the United Stabe sat 6877) 762-2974.oul side the United States at(717) 572-3993orfax 3170572-4002Wiley also publishes its books in a variety of electronic formats and by print-on-demand Not all contentyou have purchased a version of this book that did not include media that is referenced by or accompaniesas tn dard print y us in, you may ro quest this med in by vi ing http i//book r upport wil uy.con ForLibrary of Congress Control Number : 2012934987All other trademarks are the property of the irrespective owners John Wiley&Sons, Inc.is not associated
About the AuthorsCharlie Miller is a Principal Research Consultant at Accu vant Labs.Dr.Millerwas a Global Network Exploitation Analyst at the National Security Agency(NSA) for 5 years.He was the first person to find a public remote exploit for boththe iPhone and the G 1 Android phone.He has wontheCanSecWestPwn2Ownhacking competition for the last four years in row.He has exploited an iPhonevia text messages and found code-signing flaws which could introduce malwarein iOS.Reporting the latter got him kicked out of the iOS developer programHe has authored two information security books and holds a PhD from theUniversity of Notre Dame.Dionysus Bla zak is is a programmer and security researcher specializing inexploit mitigation techniques.He has spoken at multiple security conferenceson exploitation mitigation 5, mitigation bypasses, and new methods for vulner-ability discovery.Working with Charlie Miller, he developed an iOS exploit forPwn2own2011towin the iPhone exploitation prize.Dionysus also won the2010Pwnie Award for Most Innovative Research, recognizing his presentationof techniques leveraging aJIT compiler to bypass data execution prevention.DinoDaiZovi, Co-Founder and C TO at Trail of Bits, has been working ininformation security for over a decade with experience in red teaming.penetra-tion testing.software security, information security management, and cyber se-curity R&D.Dino is also a regular speaker at information security conferenceshaving presented his independent research on memory corruption exploitationtechniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits atconferences around the world including DEFCON, BlackHat, and Can Sec West.He is a co-author of the books The Mac Hacker's Handbook(Wiley, 2009) and
The Art of Soft u are Securi fy Testing(Addison-Wesley, 2006) .He is perhaps bestknown in the information security and Mac communities for winning the firstPWN2OWN contest at Can Sec West 2007.Vincenzo I oz zo is a security researcher atTi qad srl.He is a regular speaker atvarious information security conferences including BlackHat and Can Sec WestHe is perhaps best known in the information security industry for co-writing theexploits for BlackBerry OS and iPhone OS to winPwn2own2010andPwn2own2011.He also serves on the review board for BlackHat and Shaka con.He tweet sate_snag gStefan Esser is best known in the security community as the PHP securityguy.Since he became a PHP core developer in2002he devoted alot of time toPHP and PHP application vulnerability research.However in his early days hereleased lots of advisories about vulnerabilities in software like CVS, Samba,OpenBSD, or InternetExplorer.In2003he was the first to boot Linux directlyfrom the harddisk of an unmodified XBOX through a buffer overflow in theXBOX font loader.In2004he founded the Hardened-PHP Project to develop amore secure version of PHP known as Hardened-PHP which evolved into theSu hos in PHP Security System in 2006.Since 2007he works as head of researchand development for the German web application company Sektion Eins GmbHthat he co-founded.Since 2010, he is actively researching iOS security topics,and in 2011, he supplied the jail breaking scene with an exploit that survivedmultiple updates by Apple.Ralf-Philipp Weinmann is a postdoctoral researcher at the University ofLuxembourg.His research interests in information security are diverse, span-ning topics from cryptanalysis to the security of mobile devices.He has beenknown to be involved in drastic speed-ups of WE Pe racking; an analysis ofApple's FileVault; reverse-engineering; breaking proprietary cryptographicalgorithms in DECT; and penetrating smartphones, both through web browsers(PWN2OWN) , as well as through their GSM stacks.Ralf has studied computerscience and completed aPh.D.in cryptography at the TU Darmstadt in Germany.
Eric McDonald(Muscle Nerd ) is a Staff Engineer at a southern Calforniahigh-tech firm where he specializes in reverse engineering B lOSes.He is a mem-ber of the iPhone Dev Team, which has been developing free iPhone jail breaksand carrier unlocks since the first iPhone in 2007.He was previously involvedin hacking the first two generations of TiVo hardware and was technical editorof Hacking the TiVo, 2nd Edition Course TeclmolagyPTR, 2004.Originally from theBoston area, he holds S.BandS.M.degrees from M.IT.
Introduction
Chapter 1
chapter 2
XV
12235566778899址
iOS Security Basics
iOS Hardware/Device Types
How Apple Protects the App Store
Understanding Security Threats
Understanding iOS Security Architecture
The Reduced Attack Surface
The Stripped-Down iOS
Privilege Separation
Code Signing
Data Execution Prevention
Address Space Layout Randomization
Sandboxing
A Brief History of iOS Attacks
Libtiff
Fun with SMS
The I kee Worm
Storm 8
Spy Phone
Pwn20wn 2010
Jailbreakme.com2( Star )
Jailbreakme.com3( Saffron )
Summary
iOS in the Enterprise
iOS Configuration Management
Mobile Configuration Profiles
iPhone Configuration Utility
Updating Prof les
Removing Profiles
Applications and Provisioning Profiles
Setting Up Profile Manager
Creating Settings
Enrolling Devices
Installation Prerequisites
Building the Ramdisk
Booting Ramdisk
Brute-Force Attacking Four-Digit Passcodes
Dumping Keychain
Dumping Data Partition
Decrypt ng Data Partition
Creating a Configuration Profile
Installin