📅 June 6, 2012

iOS Hacker’s Handbook

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

Continue reading “iOS Hacker’s Handbook”

📅 November 29, 2011

iOS Hacker’s Handbook

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

iOS is Apple’s mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

  • Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
  • Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation
  • Companion website includes source code and tools to facilitate your efforts
iOS Hacker’s Handbook can be pre-ordered for $29.24 from amazon.com.
📅 November 8, 2011

Charlie Millers Discovers iOS Code Signing Security Flaw. Gets Kicked Out Of The Developer Program [video]

Charlie Miller, a former NSA analyst who now works as a researcher with consultancy Accuvant, created a proof-of-concept app called Instastock to show the vulnerability

Charlie Miller, a former NSA analyst who now works as a researcher with consultancy Accuvant, created a proof-of-concept app called Instastock to show the vulnerability. The simple program appears to merely list stock tickers, but also communicates with a server in Miller’s house in St. Louis, pulling down and executing whatever new commands he wants.

Continue reading “Charlie Millers Discovers iOS Code Signing Security Flaw. Gets Kicked Out Of The Developer Program “

📅 July 31, 2009

Charlie Miller Explains The Vulnerability of the iPhone And The Possibility of Being Hacked via SMS

Just as we had anticipated, Charlie Miller and Collin Mulliner, during the Black Hat Conference, spoke about the iPhone vulnerability, which can be easily hack through the SMS application.

Yesterday , FSMdotCOM told you to Pay Attention To SMS Messages Received After Thrusday 07.30.09. Your iPhone Might Get Hijacked . Just as we had anticipated, Charlie Miller and Collin Mulliner, during the Black Hat Conference, spoke about the iPhone vulnerability, which can be easily hack through the SMS application.
Continue reading “Charlie Miller Explains The Vulnerability of the iPhone And The Possibility of Being Hacked via SMS”

📅 July 29, 2009

Pay Attention To SMS Messages Received After Thrusday 07.30.09. Your iPhone Might Get Hijacked

On Thursday, two researchers plan to reveal an unpatched iPhone bug that could virally infect phones via SMS.If you receive a text message on your iPhone any time after Thursday afternoon containing only a single square character, Charlie Miller would suggest you turn the device off. Quickly!!!!

If you receive a text message on your iPhone any time after Thursday afternoon containing only a single square character, Charlie Miller would suggest you turn the device off. Quickly!!!!

That small cipher will likely be your only warning that someone has taken advantage of a bug that Miller and his fellow cybersecurity researcher Collin Mulliner plan to publicize Thursday at the Black Hat cybersecurity conference in Las Vegas. Using a flaw they’ve found in the iPhone’s handling of text messages, the researchers say they’ll demonstrate how to send a series of mostly invisible SMS bursts that can give a hacker complete power over any of the smart phone’s functions.

Continue reading “Pay Attention To SMS Messages Received After Thrusday 07.30.09. Your iPhone Might Get Hijacked”

📅 July 2, 2009

iPhone Security Flaw Discovered

Through a bug in the SMS in fact, the device may be attacked and then run a program without user intervention. In the case of Jailbroken devices, this program would take the Administrator privileges.

Do you know who Charlie Miller is? Well, Charlie is a hacker who, during the Pwn2Own event, took full control of a Mac in just 2 seconds using a security flaw in Safari. Impressed? Oh well…

Charlie moved his attention on the iPhone and in particular to a security problem in the management of SMS that allows hackers to send malicious code without user intervention.

Through a bug in the SMS in fact, the device may be attacked and then run a program without user intervention. In the case of Jailbroken devices, this program would take the Administrator privileges.

Mr Miller has also held (during the conference Syscan Singapore) that Apple is already at work in search of a remedy. Basically, despite the limited number of characters available in 1 SMS you can send a small program in binary form through multiple consecutive messages.

Finally, Miller argues that the Jailbreak eliminates about 80% of the protection system Apple, for which an iPhone is even more vulnerable to this problem.