📅 June 6, 2012

iOS Hacker’s Handbook

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

Continue reading “iOS Hacker’s Handbook”

📅 November 29, 2011

iOS Hacker’s Handbook

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

Six skilled authors Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser ( aka i0n1c ), Vincenzo Iozzo, Ralf-Phillip Weinmann and MuscleNerd as tech editor have put together a new iOS book entitled iOS Hacker’s Handbook: Arm Yourself With The Tools Needed To Identify, Understand And Foil iOS Attacks

iOS is Apple’s mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

  • Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
  • Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation
  • Companion website includes source code and tools to facilitate your efforts
iOS Hacker’s Handbook can be pre-ordered for $29.24 from amazon.com.
📅 March 25, 2010

PWN2OWN: iPhone 3Gs Hacked Minutes After The Event Started

Security researchers Vincenzo Iozzo from Zynamics GmbH and Ralf-Philipp Weinmann from the University of Luxembourg today won the “iPhone” section of the renowned PWN2OWN contest in Vancouver, Canada. The demonstrated attack code steals the SMS database from the phone, albeit other attack payloads are easily possible.

Security researchers Vincenzo Iozzo from Zynamics GmbH and Ralf-Philipp Weinmann from the University of Luxembourg today won the “iPhone” section of the renowned PWN2OWN contest in Vancouver, Canada. The demonstrated attack code steals the SMS database from the phone, albeit other attack payloads are easily possible.

Continue reading “PWN2OWN: iPhone 3Gs Hacked Minutes After The Event Started”