Book Description
See your app through a hacker’s eyes to find the real sources of vulnerability
The Mobile Application Hacker’s Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker’s point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. * Understand the ways data can be stored, and how cryptography is defeated * Set up an environment for identifying insecurities and the data leakages that arise * Develop extensions to bypass security controls and perform injection attacks * Learn the different attacks that apply specifically to cross-platform apps
IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker’s trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker’s Handbook is a practical, comprehensive guide.
Table of Contents
Chapter 1 Mobile Application (In)security
Chapter 2 Analyzing iOS Applications
Chapter 3 Attacking iOS Applications
Chapter 4 Identifying iOS Implementation Insecurities
Chapter 5 Writing Secure iOS Applications
Chapter 6 Analyzing Android Applications
Chapter 7 Attacking Android Applications
Chapter 8 Identifying and Exploiting Android Implementation Issues
Chapter 9 Writing Secure Android Applications
Chapter 10 Analyzing Windows Phone Applications
Chapter 11 Attacking Windows Phone Applications
Chapter 12 Identifying Windows Phone Implementation Issues
Chapter 13 Writing Secure Windows Phone Applications
Chapter 14 Analyzing BlackBerry Applications
Chapter 15 Attacking BlackBerry Applications
Chapter 16 Identifying BlackBerry Application Issues
Chapter 17 Writing Secure BlackBerry Applications
Chapter 18 Cross-Platform Mobile Applications
中文:
书名:The Mobile Application Hacker’s Handbook
通过黑客的眼睛查看您的应用程序,以找到真正的漏洞来源
《移动应用程序黑客手册》是一本全面的指南,通过从黑客的角度处理问题来保护所有移动应用程序。这本书非常实用,为发现和利用iOS、Android、Blackberry和Windows Phone平台上的移动应用程序中的缺陷提供了专家指导。您将学习经过验证的移动应用评估方法,以及用于预防、中断和补救各种类型攻击的技术。覆盖范围包括数据存储、加密、传输层、数据泄漏、注入攻击、运行时操纵、安全控制和跨平台应用程序,其中重点介绍了漏洞,并详细介绍了黑客用来绕过标准安全的方法。
移动应用程序广泛用于消费者和企业市场,以处理和/或存储敏感数据。目前关于移动安全主题的文章很少,但仅苹果应用商店中就有100多万个应用程序,攻击表面是重大的。这本书通过演示黑客如何利用弱点和缺陷来访问数据,帮助您保护移动应用程序的安全。*了解存储数据的方式,以及如何击败加密技术*建立环境以识别不安全和出现的数据泄漏*开发扩展以绕过安全控制并执行注入攻击*了解专门适用于跨平台应用程序的不同攻击
IT安全漏洞成为头条新闻,随着大公司受到攻击,数百万消费者容易受到攻击。了解黑客的交易技巧可以让安全专业人士严密锁定该应用程序。对于更好的移动安全和更不容易受到攻击的数据,《移动应用程序黑客手册》是一本实用、全面的指南。
目录表
Chapter 1 Mobile Application (In)security
第2章分析iOS应用程序
第3章攻击iOS应用程序
第4章确定IOS实施的不安全因素
Chapter 5 Writing Secure iOS Applications
第6章分析Android应用程序
第七章攻击Android应用程序
第8章确定和利用Android实现问题
Chapter 9 Writing Secure Android Applications
Chapter 10 Analyzing Windows Phone Applications
Chapter 11 Attacking Windows Phone Applications
第12章确定Windows Phone实施问题
Chapter 13 Writing Secure Windows Phone Applications
Chapter 14 Analyzing BlackBerry Applications
Chapter 15 Attacking BlackBerry Applications
第16章确定黑莓应用程序问题
Chapter 17 Writing Secure BlackBerry Applications
Chapter 18 Cross-Platform Mobile Applications
评论前必须登录!
注册