Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Overview

Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style.

Subscriber Reviews

Average Rating: 4.75 out of 5 rating Based on 4 Ratings

"Enlightening and inspiring" - by mko on 26-FEB-2012
Reviewer Rating: 1 star rating2 star rating3 star rating4 star rating5 star rating
This book shows the other side of Apple’s devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your “precious”. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you’d better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won’t be able to follow all exercises.

Report as Inappropriate

Extras

The publisher has provided additional content related to this title.


Description
Content

Visit the catalog page for Hacking and Securing iOS Applications

  • Catalog Page

Visit the errata page for Hacking and Securing iOS Applications

  • Errata

Download the supplemental electronic content for Hacking and Securing iOS Applications

  • Supplemental Content