Enjoy fast, FREE delivery, exclusive deals and award-winning movies & TV shows with Prime
Try Prime
and start saving today with Fast, FREE Delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$34.11$34.11
FREE delivery:
Friday, Sep 8
Payment
Secure transaction
Ships from
Amazon.com
Sold by
Amazon.com
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Buy used: $28.04
Other Sellers on Amazon
& FREE Shipping
81% positive over last 12 months
& FREE Shipping
90% positive over last 12 months
Usually ships within 3 to 4 days.
& FREE Shipping
86% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
iOS Hacker's Handbook 1st Edition
Purchase options and add-ons
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.
- Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
- Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
- Also examines kernel debugging and exploitation
- Companion website includes source code and tools to facilitate your efforts
iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.
- ISBN-101118204123
- ISBN-13978-1118204122
- Edition1st
- PublisherWiley
- Publication dateApril 20, 2012
- LanguageEnglish
- Dimensions7.38 x 0.92 x 9.25 inches
- Print length416 pages
Frequently bought together

Customers who viewed this item also viewed
Editorial Reviews
From the Inside Flap
They can crack the code. Here's how to stop them.
The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications.
These highly qualified iOS experts review iOS security architecture, examine the internals, and reveal the vulnerabilities. They show you how iOS jailbreaks work and explore encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks. Here's a complete toolkit for defending your iOS devices.
Examine the internals and identify the vulnerabilities of iOS
Explore all the elements of encryption, vulnerability hunting, and exploit writing
Review some common payloads and see what can and can't be done on iOS with ROP
Learn more about kernel debugging and exploitation, with an overview of kernel structure and a look at auditing IOKit drivers
Look at techniques for fuzzing PDF and PowerPoint® documents in MobileSafari
Study different jailbreak types
Companion website
Source code and additional tools are available at www.wiley.com/go/ioshackershandbook
From the Back Cover
They can crack the code. Here's how to stop them.
The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications.
These highly qualified iOS experts review iOS security architecture, examine the internals, and reveal the vulnerabilities. They show you how iOS jailbreaks work and explore encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks. Here's a complete toolkit for defending your iOS devices.
Examine the internals and identify the vulnerabilities of iOS
Explore all the elements of encryption, vulnerability hunting, and exploit writing
Review some common payloads and see what can and can't be done on iOS with ROP
Learn more about kernel debugging and exploitation, with an overview of kernel structure and a look at auditing IOKit drivers
Look at techniques for fuzzing PDF and PowerPoint® documents in MobileSafari
Study different jailbreak types
Companion website
Source code and additional tools are available at www.wiley.com/go/ioshackershandbook
About the Author
Charlie Miller is Principal Research Consultant at Accuvant Labs and a four-time CanSecWest Pwn2Own winner.
Dionysus Blazakis is an expert on iOS and OS X sandbox security mechanisms.
Dino Dai Zovi is coauthor of The Mac Hacker's Handbook and a popular conference speaker.
Stefan Esser is a PHP security expert and leading researcher of iOS security topics.
Vincenzo Iozzo is an independent security researcher focused on Mac OS X and smartphones.
Ralf-Philipp Weinmann holds a PhD in cryptography and has an extensive security background.
Product details
- Publisher : Wiley; 1st edition (April 20, 2012)
- Language : English
- Paperback : 416 pages
- ISBN-10 : 1118204123
- ISBN-13 : 978-1118204122
- Item Weight : 1.36 pounds
- Dimensions : 7.38 x 0.92 x 9.25 inches
- Best Sellers Rank: #151,398 in Books (See Top 100 in Books)
- #15 in Macintosh Operating System
- #20 in Computer Operating Systems (Books)
- #108 in Computer Hacking
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the authors

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonRead reviews that mention
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book begins covering sandboxing, code signing and iOS enterprise applications, and their weaknesses. The chapter on fuzzing was very explanatory on the techniques used to do so. It covered fuzzing PDF and powerpoint documents in mobile safari, as well as SMS fuzzing. The next chapter talks about exploitation on iOS devices, focusing on heap exploits and in turn, memory allocation and deallocation.
The chapter on ROP explains what is capable and not capable with return oriented programming, and gives two great examples of such techniques. Following that is a chapter on kernel exploitation, describing how to reverse the IOKit kernel drivers and finding vulnerabilities, as well as how to exploit vulnerabilities once found. This chapter concludes with a demonstration on the heap fang shui technique used for heap buffer overflow exploits.
The jailbreaking chapter is not particularly long, but that is because the techniques used have been described in other parts of the book. This chapter examines the redsn0w jailbreak and describes each step performed by it, including the different kernel patches applied by the jailbreak.
The final chapter covers baseband hacking, which I have not read in detail yet. It appears, at first glance, to cover general knowledge on cell networks leading into the RTOS used on the baseband chips, and ending with a description of the ultrasn0w unlock.
Overall, I would recommend anyone who is interested in the techniques and steps used to find vulnerabilities and exploit them, leading to the development of a jailbreak for an iOS device.
The way current hacking techniques are being introduced, should enable less experienced programmers and enthusiast to get started and the more advanced reader will find a very well processed compendium (and more).
About the troll comments further down:
Some are obviously misinterpreting this book's intention. It's not about giving you a detailed tutorial on how to create a jailbreak, but to give a starting point, to introduce techniques needed and to motivate you to start learning and researching (btw. this belongs to security RESEARCH). Creating a jailbreak needs weeks and months of work, not to mention the vast experience and skills needed to pull of such a major task. One book can't accomplish that. So if you really want to become the next comex or pod2g: get off your backside, learn basics, read this book, read more materials, train your obtained skills and at the end of the road you might be able to develop your own exploits which will lead to a jailbreak.
this book doesn't help anyone who is trying to learn about exploits or code - written very pooly as well and much more than just a simple language barrier - the writer clearly didn't want to or was threatened by the hackers community not to expose any secrets.
complete waste of my money and time waiting for this garbage
DO NOT WASTE YOUR TIME OR MONEY
The authors manage to cover a variety of different subjects in enough detail to give you a good grounding in the iOS security model as well as the current state of vulnerability discovery on the platform.
Top reviews from other countries
I recommend it
The first chapter is a good summary and after all chapter go in detail.







