Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Chapter 1: iOS Security Basics
iOS Hardware/Device Types How Apple Protects the App Store Understanding Security Threats Understanding the iOS Security Architecture A Brief History of iOS Attacks Summary
Chapter 2: iOS in the Enterprise
iOS Configuration Management Mobile Device Management Summary
Chapter 3: Encryption
Data Protection Attacking Data Protection Summary
Chapter 4: Code Signing and Memory Protections
Understanding Mandatory Access Control How Provisioning Works Understanding Application Signing Inside Entitlements How Code Signing Enforcement Works Discovering Dynamic Code Signing Breaking Code Signing Summary
Chapter 5: Sandboxing
Understanding the Sandbox Sandboxing Your Apps Understanding the Sandbox Implementation Summary
Chapter 6: Fuzzing iOS Applications
How Fuzzing Works The Recipe for Fuzzing Fuzzing Safari Adventures in PDF Fuzzing Quick Look Fuzzing Fuzzing with the Simulator Fuzzing MobileSafari PPT Fuzzing Fun SMS Fuzzing Summary
Chapter 7: Exploitation
Exploiting Bug Classes Understanding the iOS System Allocator Taming the iOS Allocator Understanding TCMalloc Taming TCMalloc ASLR Challenges Case Study: Pwn2Own 2010 Testing Infrastructure Summary
Chapter 8: Return-Oriented Programming
ARM Basics ROP Introduction What Can You Do with ROP on iOS? Examples of ROP Shellcode on iOS Summary
Chapter 9: Kernel Debugging and Exploitation
Kernel Structure Kernel Debugging Kernel Extensions and IOKit Drivers Kernel Exploitation Summary
Chapter 10: Jailbreaking
Why Jailbreak? Jailbreak Types Understanding the Jailbreaking Process Executing Kernel Payloads and Patches Summary
Chapter 11: Baseband Attacks
GSM Basics Setting up OpenBTS RTOSes Underneath the Stacks Vulnerability Analysis Exploiting the Baseband Summary
Appendix: Resources Introduction
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion