This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabilities of iOS devices and applications. It explores various attack methods, including forensic trace analysis, exploiting the Objective-C runtime, and hijacking traffic. Additionally, it offers counter-forensic techniques and security measures that developers can implement to protect their applications and user data. The book also highlights the importance of strong passphrases and key derivation functions for secure encryption.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Hacking-Securing-iOS-Applications-Hijacking-ebook/dp/B006ZN9ZP2?&linkCode=ll1&tag=cvthunderx-20&linkId=61ce3fd9b230a556c9ea237ae3f1a941&language=en_US&ref_=as_li_ss_tl