资料下载网
首页 计算机 考试教辅
iOS黑客手册(IOS Hacker Handbook)_Charlie Miller著 pdf电子书免费下载,百度云
首页 > 计算机 > 计算机F > iOS黑客手册(IOS Hacker Handbook)_Charlie Miller著 pdf电子书免费下载,百度云

《iOS黑客手册(IOS Hacker Handbook)_Charlie Miller著》pdf电子书免费下载


下载方式一:

百度网盘下载地址:https://pan.baidu.com/s/1OwNc8x0L_wEXx6n0NH3QKQ
百度网盘密码:1111

下载方式二:

http://ziliaoshare.cn/Download/af_123880_pd_iOSHKSC(IOSHackerHandbook)_CharlieMillerZ.zip

 


iOS黑客手册(IOS Hacker Handbook)_Charlie Miller著

作者:empty

页数:410

出版社:empty

《iOS黑客手册(IOS Hacker Handbook)_Charlie Miller著》介绍

No part of this publication maybe reproduced, stored in a retrieval system or transmitted in any fermorby any means.electron k, mechanical p holo copying, recording scanning or otherwise, exo epta sperm i ledsion of the Publish et, or authorization through payment of the appropriate per-copy fee to the Copyright111RiverSIreet Hoboken.NJ 07130.201) 746-6011, fax(201) 748-6008,oronlineathtcp://wwv.wlley-Limit of Liability/DiselaimerofWarranty:Thepublisherandtheauthormakenorepresenationsorwar-warranties, in chu ding without limitation warranties of fitness for a particular purpose.No warranty maybefender in gk gaL accounting or other professional service klf professional aseistancrnsrequined.the perv ionsdime ged arising here from The fact that an organization or Web sife is referred to in this work as aci lationand/or a potential source of further information does not mean that the author or the publisher endorsesthe info e mation the organization or web sile may p to video r to commendations it may make.Further.readersshould be aware that Inte met webs tess ted in this work may have changed ords appeared between whenthis work was written and wh mn it is readFor general info emaio non our other products and services please contact our Cu some r Care Departmen lwithin the United Stabe sat 6877) 762-2974.oul side the United States at(717) 572-3993orfax 3170572-4002Wiley also publishes its books in a variety of electronic formats and by print-on-demand Not all contentyou have purchased a version of this book that did not include media that is referenced by or accompaniesas tn dard print y us in, you may ro quest this med in by vi ing http i//book r upport wil uy.con ForLibrary of Congress Control Number : 2012934987All other trademarks are the property of the irrespective owners John Wiley&Sons, Inc.is not associated

About the AuthorsCharlie Miller is a Principal Research Consultant at Accu vant Labs.Dr.Millerwas a Global Network Exploitation Analyst at the National Security Agency(NSA) for 5 years.He was the first person to find a public remote exploit for boththe iPhone and the G 1 Android phone.He has wontheCanSecWestPwn2Ownhacking competition for the last four years in row.He has exploited an iPhonevia text messages and found code-signing flaws which could introduce malwarein iOS.Reporting the latter got him kicked out of the iOS developer programHe has authored two information security books and holds a PhD from theUniversity of Notre Dame.Dionysus Bla zak is is a programmer and security researcher specializing inexploit mitigation techniques.He has spoken at multiple security conferenceson exploitation mitigation 5, mitigation bypasses, and new methods for vulner-ability discovery.Working with Charlie Miller, he developed an iOS exploit forPwn2own2011towin the iPhone exploitation prize.Dionysus also won the2010Pwnie Award for Most Innovative Research, recognizing his presentationof techniques leveraging aJIT compiler to bypass data execution prevention.DinoDaiZovi, Co-Founder and C TO at Trail of Bits, has been working ininformation security for over a decade with experience in red teaming.penetra-tion testing.software security, information security management, and cyber se-curity R&D.Dino is also a regular speaker at information security conferenceshaving presented his independent research on memory corruption exploitationtechniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits atconferences around the world including DEFCON, BlackHat, and Can Sec West.He is a co-author of the books The Mac Hacker's Handbook(Wiley, 2009) and

The Art of Soft u are Securi fy Testing(Addison-Wesley, 2006) .He is perhaps bestknown in the information security and Mac communities for winning the firstPWN2OWN contest at Can Sec West 2007.Vincenzo I oz zo is a security researcher atTi qad srl.He is a regular speaker atvarious information security conferences including BlackHat and Can Sec WestHe is perhaps best known in the information security industry for co-writing theexploits for BlackBerry OS and iPhone OS to winPwn2own2010andPwn2own2011.He also serves on the review board for BlackHat and Shaka con.He tweet sate_snag gStefan Esser is best known in the security community as the PHP securityguy.Since he became a PHP core developer in2002he devoted alot of time toPHP and PHP application vulnerability research.However in his early days hereleased lots of advisories about vulnerabilities in software like CVS, Samba,OpenBSD, or InternetExplorer.In2003he was the first to boot Linux directlyfrom the harddisk of an unmodified XBOX through a buffer overflow in theXBOX font loader.In2004he founded the Hardened-PHP Project to develop amore secure version of PHP known as Hardened-PHP which evolved into theSu hos in PHP Security System in 2006.Since 2007he works as head of researchand development for the German web application company Sektion Eins GmbHthat he co-founded.Since 2010, he is actively researching iOS security topics,and in 2011, he supplied the jail breaking scene with an exploit that survivedmultiple updates by Apple.Ralf-Philipp Weinmann is a postdoctoral researcher at the University ofLuxembourg.His research interests in information security are diverse, span-ning topics from cryptanalysis to the security of mobile devices.He has beenknown to be involved in drastic speed-ups of WE Pe racking; an analysis ofApple's FileVault; reverse-engineering; breaking proprietary cryptographicalgorithms in DECT; and penetrating smartphones, both through web browsers(PWN2OWN) , as well as through their GSM stacks.Ralf has studied computerscience and completed aPh.D.in cryptography at the TU Darmstadt in Germany.

Eric McDonald(Muscle Nerd ) is a Staff Engineer at a southern Calforniahigh-tech firm where he specializes in reverse engineering B lOSes.He is a mem-ber of the iPhone Dev Team, which has been developing free iPhone jail breaksand carrier unlocks since the first iPhone in 2007.He was previously involvedin hacking the first two generations of TiVo hardware and was technical editorof Hacking the TiVo, 2nd Edition Course TeclmolagyPTR, 2004.Originally from theBoston area, he holds S.BandS.M.degrees from M.IT.


《iOS黑客手册(IOS Hacker Handbook)_Charlie Miller著》目录

Introduction

Chapter 1

chapter 2

XV

12235566778899址

iOS Security Basics

iOS Hardware/Device Types

How Apple Protects the App Store

Understanding Security Threats

Understanding iOS Security Architecture

The Reduced Attack Surface

The Stripped-Down iOS

Privilege Separation

Code Signing

Data Execution Prevention

Address Space Layout Randomization

Sandboxing

A Brief History of iOS Attacks

Libtiff

Fun with SMS

The I kee Worm

Storm 8

Spy Phone

Pwn20wn 2010

Jailbreakme.com2( Star )

Jailbreakme.com3( Saffron )

Summary

iOS in the Enterprise

iOS Configuration Management

Mobile Configuration Profiles

iPhone Configuration Utility

Updating Prof les

Removing Profiles

Applications and Provisioning Profiles

Setting Up Profile Manager

Creating Settings

Enrolling Devices

Installation Prerequisites

Building the Ramdisk

Booting Ramdisk

Brute-Force Attacking Four-Digit Passcodes

Dumping Keychain

Dumping Data Partition

Decrypt ng Data Partition

Creating a Configuration Profile

Installin

计算机


python
AI人工智能
javascript
计算机网络/服务器
数据库技术
计算机F

考试教辅


考研考博
英语四六级

沪ICP备18046276号-5