HACKING: Rooting & Jailbreaking by Wagner Alex & Wagner Alex

HACKING: Rooting & Jailbreaking by Wagner Alex & Wagner Alex

Author:Wagner, Alex & Wagner, Alex [Wagner, Alex]
Language: eng
Format: epub
Published: 2020-01-24T16:00:00+00:00


Chapter 12 IOS Architecture Basics

Once you get into an Apple environment, it's very restrictive. Yet, Apple controlling both hardware and software, it does lead to better controls all around.

First, we are going to make sure that you understand the IOS architecture, and how Apple is designed. We'll also look at understand the device itself, and then, instead of talking about rooting, in the Apple world, we do something called jailbreaking.

Lastly, just like in the Android environment, we will discuss how we can secure the IOS or Apple devices. To begin with, Apple is exceptionally unique. It has some similarities as far as it’s layered to Android.

There are several different layers that we'll take a look at, but this particular operating system is called IOS, aka Integrated Operating System. It is the platform that Apple uses for iPhones, iPads, iPods.

Apple does not allow iOS to be implemented on any non-Apple devices that are out there, and just like what we have with Android, IOS is simply an intermediary between the hardware and the applications.

Applications are not supposed to try to access hardware directly. Instead, they're going through several different layers of the architecture. The first one is the core OS.

The system-level involves the kernel environment, the drivers, and the low-level UNIX interfaces of the operating system. IOS provides a set of interfaces for accessing many of the features of the operating systems.

When devs create applications, those features are handled through the lib system library, and the interfaces are C-based, which gives us the ability to control things such as networking or BSD sockets, locale information, also networking components, as well as the file system access.

It's also in charge of things like DNS services and Bonjour. It also has a core Bluetooth framework, which is responsible for what Apple devices sound like. It's a framework that allows developers to interact with the Bluetooth accessories, or to create accessories via Bluetooth, so we're able to scan for those accessories, then connect or disconnect from them.

We're able to broadcast using iBeacon. We can preserve the Bluetooth connections and restore the links when your app needs that Bluetooth device.

There's also a generic security service framework or also known as GSS, which gives you a standard set of security services for IOS applications. Besides the regular interfaces that it supports, IOS can also include some additions for managing credentials that are not part of the standard but may be used by specific applications.

We also have the framework for the external accessories, which gives us the ability to communicate with hardware accessories over the 30 pin connectors and lightning connectors, or even using Bluetooth.

Then we also have the standard security framework which Apple uses to guarantee the security of data that applications utilize. This interface manages the access to certificates, public and private keys, trust policies, as well as the storage of certificates and cryptographic keys in a key chain.

Without getting in-depth with key chains, the key chain can be used among multiple apps that you create. This way it’s easier for applications to interoperate.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12571)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7780)
Grails in Action by Glen Smith Peter Ledbrook(7696)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6417)
Kotlin in Action by Dmitry Jemerov(5065)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3801)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3087)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2313)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2302)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2261)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2178)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2077)
Full-Stack React Projects by Shama Hoque(1990)