Preface 1.Everything You Know Is Wrong The Myth of a Monoculture The iOS Security Model Components of the iOS Security Model Storing the Key with the Lock Passcodes Equate to Weak Security Fotensic Data Trumps Encryption External Dara Is at Risk, Too Hij acking Traffic Data Can Be Stolen...Quickly Trust No One, Not Even Your Application Physical Access Is Optional Summary PartⅠ. Hacking 2.The Basics of(omprornising iOS Why Its Important to Learn How to Break Into a Device Jailbreaking Explained Developer Tools End User Jailbreaks Jailbreaking an iPhone DFU Mode Tethered Versus Untethered Compromising Devices and Injecting Code Building Custom Code Analyzing Your Binary TestingYourBinary Daemonizing Codey Deploying Malicious Code with a Tar Archive Deploying Malicious Code with a RAM Disk Exercises Summary 3.StealingtheFilesystem Full Disk Encryption Solid State NAND Disk Encryption Where iOS Disk Encryption Has Failed You Copying the Live Filesystem The DataTheft Payload Customizing launchd Preparing the RAM disk Imaging the Filesystem Copying the Raw Filesystem The RawTheft Payload Customizing launchd Preparing the RAM disk Imaging the Filesystem Exercises The Role of Soaal Engineering Disabled Device Decoy Deacrivated Device Decoy Malware Enabled Decoy Password Engineering Application Summary 4.ForensicTraceand Data Leakage Extracring Image Geotags Consolidated GPS Cache SQLite Databases Connecting to a Database SQLite Built-in Commands Issuing SQL Queries Important Database Files Address Book Contacts Address Book Images Google Maps Data Calendar Events Call History Email Database Notes …… PartⅡ. Securing