Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
S**Y
Highly recommend this if you are a penetration tester or iOS developer
I work as a penetration tester, and have a background in development. I found this book to be *extremely* well written, full of useful tutorials on how to attack iOS, and even more importantly how to write your applications to be less susceptible to attack.In addition, the author references many valuable tools that were new to me to use during your penetration tests that can uncover flaws and vulnerabilities (eg Cycript) in applications.The author was formerly (and maybe still is) a member of one of the original iPhone jail-breaking groups, and his expertise shows. I've already recommended this book to 3 co-workers, and if you develop iOS apps you *need* to read this book to understand how attackers think and how they will attempt to break your application.And, of course, if you are involved in performing iOS application security reviews or penetration tests, this is an EXCELLENT book that will walk you through how to perform seemingly complex attacks against applications. Great book!
S**S
Eye opening read.
This book is a little older than I expect. They do most of the examples in iOS 7. However, you can still jail break iOS 8.3 and run the examples. If you are a current iOS 9 user I don't know what the fate of jail breaking will be with OS. I would do research on it prior to purchasing. Even if you don't do the examples / tutorials. It is a very enlightening read about Apple products. You should read just for the knowledge.
K**K
An absolute MUST READ for anyone working with iOS security -- developers and infosec alike
Highly useful reading for everyone working with iOS security, either in IT Security or app development. It provides hugely insightful and deep descriptions of how iOS encryption works (among many other things). Every iOS app developer should read and understand these things in detail. And the balance of technical information and labs that the reader can work through (including downloadable source code examples) makes this a practical book for many people. If you work in iOS security at any level, there is no excuse for not reading this book.
G**E
Enjoyable and thorough
Excellent resource. Well written and researched w/concrete real world examples. I recommended this book to my colleagues and management as important background information to be incorporated in our design/development practices. I especially enjoyed the analysis of several commercially available applications. I would not have time to perform such research, so being able to read about this in a single book was a big win. Well worth the time and money.
A**R
Solid resource, very dated
I found this book a thorough and solid resource, however quite dated. A book like this, needs to be updated or have updates online for drawing from. The mobile space (including iOS) moves way too fast for such a out of date resource. The work, though is very thorough and informative.
1**9
Nice content, terrible print quality
The print quality is terrible, I doubt my book is photocopied, even my laserjet could print more clearly.I own 30+ O'Reilly books, this is the first one I regret to buy.
T**3
Good book back in 2008-2009
Good book back in 2008-2009, we are in what iOS8 now. This book gives you some good security tips and is well written, just kind of out dated at this point.
M**.
Great Book
Full of examples that actually work. The author firsts explains what can be done, provides you the code and instruction to compile and then deploy the code. He then walks you through how to defend against it.
A**R
Very good book
Explain things in a very detail way! I like it very much! Would like to know more books from him.
I**K
Awesome...
If you are a penetration tester or developer and you are concerned with iOS security this is a must read.If you work in enterprise and need to know the weaknesses of iOS it is well worth reading.If your a beginner don't expect an easy ride.You can't just flick through the pages compile the examples and expect them to work. You will need to give them a go and play around until you can get them working.I would have given the book 5* if the examples were without errors, a little bit poor on O'reillys part for not proof reading them / testing.Never the less, I found this a really good read, opened my eyes to different exploits that exist in iOS and how to get them onto devices. Very well thought out and structured, particularly liked the Attacking & Defending sides of the book.Buy it!
Trustpilot
2 months ago
4 days ago