Skip to main content
main-content
Top

About this book

Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a concise, deep dive into iOS security, including all the tools and methods to master reverse engineering of iOS apps and penetration testing.

What you will learn:

• Get a deeper understanding of iOS infrastructure and architecture• Obtain deep insights of iOS security and jailbreaking• Master reverse engineering techniques for securing your iOS Apps• Discover the basics of application development for iOS• Employ security best practices for iOS applications

Who is this book for:

Security professionals, Information Security analysts, iOS reverse engineers, iOS developers, and readers interested in secure application development in iOS.

Table of Contents

Chapter 1. Introduction to iOS

Abstract
iOS has been around since 2007, when we first saw the iPhone, a beautiful device with iOS in it. Developed by the Apple Macintosh team, it was originally called iPhone OS, was renamed to iOS in 2010, and now runs Apple’s iPhone, iPad, and iPod Touch. It is the second most popular mobile phone in the world after Android. iOS has been around for nine years and we have seen a lot of changes since its launch. It has always been in the spotlight for its security bugs, with the first bug hitting the web in 2007.
Kunal Relan

Chapter 2. iOS App Development Basics

Abstract
This chapter takes you through the basics of app development and app architecture in iOS. This chapter is for readers who are new to this environment. Hence, those of you who are already working on iOS development may skip this chapter and move on.
Kunal Relan

Chapter 3. iOS App Vulnerabilities and Jailbreaking

Abstract
This chapter builds on the finer parts of your iOS security knowledge. In the previous chapter, you learned about iOS applications development. This chapter discusses the “whys” and “hows” of jailbreaking. We discuss how a jailbreak works on an iOS device and how to install repositories on Cydia.
Kunal Relan

Chapter 4. Blackbox Testing iOS Apps

Abstract
It’s been a long journey discussing the ins and outs of iOS, including its security features, loopholes, development, and tools.
Kunal Relan

Chapter 5. iOS Security Toolkit

Abstract
So far we have been digging deep into iOS application security and have covered the basic hacks to look for when testing iOS applications. In this chapter, we cover advanced and low-level iOS app security concepts that will give you an even better understanding and better skills for iOS app security testing. This chapter discusses disassembly iOS application binaries, advance runtime manipulation, and static analysis on iOS applications.
Kunal Relan

Chapter 6. Automating App Testing

Abstract
In this chapter, we will check out various automated testing modules and toolsets for performing penetration testing on third-party apps. You will learn to use different open source tools in this chapter.
Kunal Relan

Chapter 7. iOS App Security Practices

Abstract
So far it has been a journey of testing, configuring, decompiling, and debugging the iOS apps. You have worked on different methodologies and techniques for penetrating into an iOS application. In this last chapter, we talk about securing iOS apps according to the best practices and industry standards. We all know that perfect security is an illusion; however, there is a lot we can do with our app to make sure we make it hard for someone to attack or play around with it. This chapter talks about best practices for storing data, communicating with the server, deploying apps on the App Store, and other methods to make sure we give our best to secure the application. We will be thinking like a security conscious app developer and a penetration tester at the same time to ensure we develop the application from both point of views.
Kunal Relan
Additional information