LEADER 05515nam 2200697 450 001 9910827570103321 005 20200520144314.0 010 $a1-118-95852-7 010 $a1-118-95851-9 035 $a(CKB)3710000000361270 035 $a(EBL)1895167 035 $a(SSID)ssj0001539424 035 $a(PQKBManifestationID)11936591 035 $a(PQKBTitleCode)TC0001539424 035 $a(PQKBWorkID)11531661 035 $a(PQKB)11435857 035 $a(Au-PeEL)EBL1895167 035 $a(CaPaEBR)ebr11069570 035 $a(CaONFJC)MIL802202 035 $a(PPN)234893702 035 $a(OCoLC)904405106 035 $a(CaSebORM)9781118958513 035 $a(MiAaPQ)EBC1895167 035 $a(EXLCZ)993710000000361270 100 $a20150714h20152015 uy 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 04$aThe mobile application hacker's handbook /$fDominic Chell [and three others] 205 $a1st edition 210 1$aIndiapolis, Indiana :$cWiley,$d2015. 210 4$dİ2015 215 $a1 online resource (1564 p.) 300 $aIncludes index. 311 $a1-119-18365-0 311 $a1-118-95850-0 327 $aCover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS Applications 327 $aIntroduction to Transport Security Identifying Insecure Storage; Patching iOS Applications with Hopper; Attacking the iOS Runtime; Understanding Interprocess Communication; Attacking Using Injection; Summary; Chapter 4 Identifying iOS Implementation Insecurities; Disclosing Personally Identifiable Information; Identifying Data Leaks; Memory Corruption in iOS Applications; Summary; Chapter 5 Writing Secure iOS Applications; Protecting Data in Your Application; Avoiding Injection Vulnerabilities; Securing Your Application with Binary Protections; Summary; Chapter 6 Analyzing Android Applications 327 $aCreating Your First Android Environment Understanding Android Applications; Understanding the Security Model; Reverse-Engineering Applications; Summary; Chapter 7 Attacking Android Applications; Exposing Security Model Quirks; Attacking Application Components; Accessing Storage and Logging; Misusing Insecure Communications; Exploiting Other Vectors; Additional Testing Techniques; Summary; Chapter 8 Identifying and Exploiting Android Implementation Issues; Reviewing Pre-Installed Applications; Exploiting Devices; Infiltrating User Data; Summary; Chapter 9 Writing Secure Android Applications 327 $aPrinciple of Least Exposure Essential Security Mechanisms; Advanced Security Mechanisms; Slowing Down a Reverse Engineer; Summary; Chapter 10 Analyzing Windows Phone Applications; Understanding the Security Model; Understanding Windows Phone 8.x Applications; Building a Test Environment; Analyzing Application Binaries; Summary; Chapter 11 Attacking Windows Phone Applications; Analyzing for Data Entry Points; Attacking Transport Security; Attacking WebBrowser and WebView Controls; Identifying Interprocess Communication Vulnerabilities; Attacking XML Parsing; Attacking Databases 327 $aAttacking File Handling Patching .NET Assemblies; Summary; Chapter 12 Identifying Windows Phone Implementation Issues; Identifying Insecure Application Settings Storage; Identifying Data Leaks; Identifying Insecure Data Storage; Insecure Random Number Generation; Insecure Cryptography and Password Use; Identifying Native Code Vulnerabilities; Summary; Chapter 13 Writing Secure Windows Phone Applications; General Security Design Considerations; Storing and Encrypting Data Securely; Secure Random Number Generation; Securing Data in Memory and Wiping Memory; Avoiding SQLite Injection 327 $aImplementing Secure Communications 330 $aSee your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage 606 $aiPhone (Smartphone)$xSecurity measures 606 $aiPhone (Smartphone)$xMobile apps 606 $aAndroid (Electronic resource)$xSecurity measures 615 0$aiPhone (Smartphone)$xSecurity measures. 615 0$aiPhone (Smartphone)$xMobile apps. 615 0$aAndroid (Electronic resource)$xSecurity measures. 676 $a005.8 700 $aChell$b Dominic$01703157 702 $aChell$b Dominic 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827570103321 996 $aThe mobile application hacker's handbook$94088151 997 $aUNINA