IOS is known to be the strongest and most secure, and for this reason its most expensive vulnerabilities came, as we mentioned earlier in an article. Hackers and trade vulnerabilities This is due to the strength of the Apple system in addition to the restrictions it puts in place, but recently a book was released that considered “Hark's Guide to Hacking the iOS System” and the book became available for sale in the Amazon store, so what does this book include? How is the stronger system penetrated globally?
Charlie Miller, one of the famous hackers in the world of iOS, who participated in a large number of hacker contests, Pwn2Own released a writing several days ago and this book is the first guide for hackers on the iOS system. Charlie has several accomplishments, the most important of which is deceiving the Apple security system. As we all know that the developer after designing the application, he sends it to the Apple team that checks it and makes sure that it is free of any unauthorized tools and that it was designed with the software that Apple provided developers with and that this program does not reach To prohibited points in the system such as reading messages and other restrictions, and this matter is the reason behind the delay in the issuance of some applications and also in their development because updating an application also goes through the same stages of sending the application itself, but Charlie announced, surprisingly to everyone, that he bypassed this and hid some malware in Its applications cannot be found by Apple engineers and then it works in the user's devices, i.e. it becomes like a Trojan horse or a sleeping spy, and these programming commands enable him to do several dangerous things.
At the SysCan conference held in Taiwan, Charlie revealed that he had hidden malware in a traditional application called Instastock. Indeed, this application obtained the approval of Apple and was issued and became available in the software store and when you run this application it begins to work traditionally and also the malware, but it needs to connect to a remote device (Charlie's computer, for example) to start working, and here she can access your device's photos and phone numbers and even switch the phone to the vibrator mode and play music or anything else that Charlie orders him to do in the victim's device, and you can watch this video explaining Charlie's experience:
After discovering this, Apple removed the Instastock application from the software store and not only did this, but also removed Charlie from the iOS programmers, and in the future he could no longer design any programs for iOS, which was expressed by Charlie that “it is cruelty from Apple and I miss Steve Jobs “.
Charlie considers his new book as a guide for anyone who wants to hack into the iOS system, as it begins by explaining the basics of the operating system, how iOS works, how to deal with memory and device resources, then how hackers work and how they discover system vulnerabilities, how Apple labs test applications, how to deceive them, and how other crackers do work "Crack" your applications, how to protect them from them, and other important security points.
This book opens fire on Apple and its system because it provided a guide for developers to discover the vulnerabilities themselves and how to expect what Apple is doing against them ... Certainly, the book will not give you the skill of pod2g or ion1c or the retired genius George Hotz, but it puts your foot on the beginning of the path of hackers. It is funny to find hackers work openly to teach others how to penetrate security systems, but also the book can be used positively to teach programmers how to protect their applications from hackers, and also, of course, Apple bought the book and closed all the holes mentioned in it, and this can be accessed. The book and buy it from amazon.
Sources: cultfmac | idownloadblog
Guys, think about the afterlife, life is but an adornment. Why are you so keen on jailbreaking when it is harmful and does little to benefit us? From my point of view, I am not convinced by the idea of jailbreaking and I would like to delete it from my device because it causes a loophole in my device. I am a person who prefers privacy because I am a Muslim and I fear for my private parts, which those corruptors may intrude upon. >> I hope you accept my words, because this is a point of view and nothing more, with all due respect to everyone.
There is a relationship between the systems and the protection programs
(Laws created to break)
I am one of those who are interested and who follow you. May God reward you well.
I want the security systems to win, but the one who submits from behind is the one who usually wins. The security systems are made and programmed, and then the hackers come after them and programme, and with this victory the hackers always win. Point of view
Hackers always win ...
Companies are running after them to remove their dirt.
Apple lost the mastermind and began to descend, especially after the disaster, Galaxy S III, Microsoft began to profit in the market for computer operating systems.
Samsung has started winning the mobile device market ...
But Apple's backbone is the iPad.
And there is no profitable company from one source, "Apple should make a bomb in the iPhone 5 at its next conference or even the iPod touch."
All thanks for your valuable information
And always wait for more mٓٓ • Your
My belief that there is a rule that governs all human beings (whatever their religions ...)
Namely: good will definitely return to his family, and inevitably evil will return to his family.
I mean, justice, there is no injustice!
Accordingly, I believe that the one who is defeated in the battle of the hacker and the (other) regimes is the one who will have transgressed and was the cruelest and most injustice of the other.!
Thank God for the blessing of Islam .
Sure, what is written to you, how to penetrate
Like what you call "hacker war"
How would you like to reveal his methods
As for me, he says that the security services are superior
I think impossible
I can almost be sure yet
Hackers Hackers
Have mercy on your days, Kevin Mitnick
May Allah reward you well, but it would be desirable if someone translated it and did not spare his Muslim brothers
Thank you
From my point of view, all hackers want is to develop their ability to penetrate, meaning that all over the world they offer to novice people how to become a hacker and pave the way for the future of the hacker world. It is the only way by which the iOS system can be defeated, no matter how strong and safe it is, meaning that the hackers are spread all over the world and each of them has different ideas and plans. This is the weapon of the near future for the hackers who are currently present to develop their centers around the world. My view is clear and touches To the steps and stages of the near future in the world of hackers
Oh God, I don't like this brand of the world. And I only know myself when he spies and collects data from Tayyib and Aidayn! I entered heaven as a result! Miserable goals!
By God, Charlie, this is forever safe
Security devices are not easy
Hہhہhہ LÕ̸̳͡Õ̸̳͡😄Õ̸̳͡Õ̸̳͡L ہhہhہh
Soon you will see me next hacker
Your brother / $
I'm kidding ע you are afraid
From my point of view, I think that the security systems to protect the consumer are comfortable, because the smart hackers see the gaps, and the security systems to protect the consumer fill them, and simply means hacking on them the difficult work. And thanks for the great article
The funny thing is ..
The book is on the Apple Store in iBooks
Hahaha, Apple devices cannot be hacked without hacking, and their devices without jailbreak are dead.
Thank you Yvonne Islam for your awareness
Amazon site gives you the option to browse part of the book, and what I liked about the "acknowledgment" page, where he thanked his wife, sons, and the last, that his two sons are members of the next generation of iOS and jailbreak hackers :)
Nice thing, iPhone Islam, but we see that Apple started issuing systems and the jailbreak is absent from it. Does this mean the victory of Apple systems and the failure of the jailbreak
Interesting topic that needs to be translated
Thank you very much, may God reward you with all the best and grant you more for what the user is interested in and is afraid of
In the name of of Allah the Merciful.
Peace, mercy and blessings of God.
Indeed, he does not deny the power of the regime.
Is it available in Arabic and free of charge?
Why did he not sell these loopholes to Apple instead of this review, and even lose it to Apple? !!!!
1-I suspect it was because Apple treated him cruelly when it kicked him off the list of programmers
2- Because people like this person do not matter the material sums because he has achieved a lot
3- The sale of this book will reap double what Apple will offer, in addition to its global fame
Jabrik Mulla invited
We hope for the victory of the security services, but not in the near future
Thank you Yvonne Islam
Frankly everyone is asking how much its price, so the question is, is it Arab?
❤☺ •• ڵ ̨̐ڵٱm ilْ ̨̐iyaym •• ☺❤
I expect Apple programmers to be the inventors of jailbreak and cydia
Thank you
Poor Charlie, but he deserves to be silent and an earring with fat
Why do they miss Steve Jobs? Why did Steve allow the hack? * _ #
Because this hacker should be appreciated by Apple for introducing them to this vulnerability instead of expelling it, and this is what Steve would have done
Musky, Charlie, is worthy, Apple was confident in him
God willing, Apple wins because it has unparalleled restrictions
Thank you, Yvonne Islam
Neither of them will win, and the war will continue because it is an exchange of interests
As long as he has a brain and an understanding, he works in the jailbreak and relieves us of the worry in which we are at least one thing that is more famous than if it breaks the system
What is the purpose of publishing such an article?
He opened the door for those with weak souls to learn to break through
If we know that the jailbreak is free?
Hand Yvonne. Islam and thank you for the most wonderful effort
To all those who sing about the power of Apple security and who did not know Apple except through the iPhone, iPad and iPod, I know Apple and its devices for more than thirty years and it did not appear to people except in recent years and it was hacked and programs were created for it that Apple could not stop and the largest jailbreak guide that we have And the programs that you get for free make Apple, like other companies, in protection, but it has easily excelled in recent devices, making it the most widespread and not the best in protection, as some believe.
Unfortunately, Charlie has been expelled from the developers that Apple can benefit from by researching the development of its programs and the strengthening of security points, and I say speeding up the decision.
As for the question, the answer is that no one has triumphed due to the presence of the two together, and this is why everyone works in favor of the other with different viewpoints, but everyone agrees that there is a mistake (gaps)
Really hackers will win and five stars for iPhone Islam *****.
I wish there was a translation of the book ..
Peace, mercy and blessings of God be upon you. ~
A great idea from Apple for owning the book, and I agree with the opinion that programmers should buy the book in order to identify weaknesses and avoid them and replace them with new and fortified ideas. Then this book will undoubtedly become worthless after a period of time, because the hackers have revealed Some of the secrets of penetrating the iOS system, which makes Apple more cautious in the coming times, and will accelerate to fill these gaps and develop its software, which makes this book no more than a (history book) because it contains the basics of the iOS system.
Thank you, Yvonne Islam, and thank you, Editor: Bin Sami.
{And God, may peace and blessings be upon our master Muhammad}
Frankly, I downloaded the book and read it, and it only contains educational pages about definitions and terms of the correct hacking language. It also discusses the main foundations of the codes curriculum that basically do not exist, but rather as examples and ideas for students of the hacking curriculum. The book is an example of our reality (such as teaching the alphabet) only, and you, in turn and your effort, learn the art of collecting those letters and putting them in their correct places. Do not forget that you cannot use those letters if you are not familiar with constructing sentences on them and coordinating their rules. In my personal opinion, since I used to practice hacking with passion and repented to God, praise be to God, I do not advise downloading the book, because what you spend on it will not benefit you. iPhone Islam deserves that money because it provides a book and programs that have an impact on this world, and we have a great reward from it. I took a long time to express myself, so I beg your pardon.
If Apple modified the device to what the user wanted, neither one would hate
The system is excellent, but it needs some modifications, such as moving backgrounds, unlocking in another way, and the appearance of applications
How weak you are, human being ... They will penetrate each other's thoughts, no matter how high they are
The manufacturing company is supposed to protect its customers from hackers and not allow anyone to reach them, otherwise trust in the company will decrease.
They are looking for security.
God willing, Apple will prevail
You write “God willing,” not “God willing,” the difference is big
What does Apple mean, salvation from the hacker, and the iPhone will be destroyed
Searching and intrusiveness is an instinct in humans and hackers are most intrusive, and the hacker will not calm down until he finds his goal, so he works with double effort to keep the caravan moving
May God have mercy on your parents, may God enlighten us
Ok, can you make the book translated into Arabic
If Apple used it to stop other hackers and protect their programs, but it is better than expelling it,
The hacker is always victorious,
May God protect us ..
One time I heard a phrase and I liked (What stops hackers but hackers) of the type of work
In general, I have great respect for the Chrisians, they are doing for the sake of the challenge ,,,
I mean this kind of curious Hackers
I think a very good book because it explains how the system works, and this is useful in devising new methods of exploiting
By virtue of that I have previous experience penetrating Apple systems
Where from my device I could call my friend with one finger
I say a beautiful article, follow-up, beautiful, and cover the most beautiful, Yvonne Islam
And you did not receive only a little knowledge
Glory be to God .. The human mind is not an ideal mind free of mistakes and defects
No matter what the person believes that he has completed his work to the fullest ... until another person appears to show him the extent of his lack of work
If Apple shows the opinion of the users and fulfills their hopes for what they want, the devices will have a safe system and no hacker will think that a jailbreak will work afterwards / take their opinion and apply it properly, so the device, even if it is different, is safe if it complains about some unsafe things. They have minds that turn it into safety !!
By God, I am from morning to night, and I pray to Apple and its beautiful system, and I especially thank Yvonne Islam
In this way, the security methods will be strengthened more, because if every hacker announces his breach and his way to penetrate it will soon be closed and destroyed, as well as everything that comes when the system becomes safer and the jailbreak is much more difficult
And above all a science education
Glory be to Allah
Like we need strong systems, we also need to penetrate some of them
And so the technology continues
Let us take into account that (as long as there is new in the information and data systems, there is similar to it in the world of hacking and hacking)
Thank you Yvonne Islam for the above
In my view, Charlie is putting the hackers' feet on the right track
Apple took an incorrect step by expelling it, and also, from my point of view, it is one of the strongest breakthroughs this year. Share with you, Charlie, even if your book is worth $ XNUMX.
It is of great value and I will buy this book
My rating of the article is *****
Originally the book is on Google Books for free
This is the link
Can I download from Google Books my brother, may God bless you ..
Honestly, after you employ Comics in Apple and the jailbreak, it is getting delayed
But, God willing, Jalberik will be an Arabic production
Soon, God willing, the translation of the book, but your invitations to us
May God reward you and many like you, kind people who are jealous of their nation who love to benefit it ... waiting impatiently for translation ...
May God reward you all the best, but you don’t forget. I followed him to Yvonne Islam.
Congratulations, pay, pray and praise, and this is the real achievement
Okay, brother.
Waiting for your translation
Thank you, Yvonne Islam
Indeed, I hope that the generation Break will soon be released by Arab hands
Finally, we discovered that Apple and the jaliberic programmers were working together
My expectation is that the hackers will prevail over the security services
God willing, he will win: $
Yvonne Islam, I have a question outside of the article, if you were kind enough.)
The jailbreak for version 5.1 was downloaded or not yet?
Unfortunately not ... but there is a restricted jailbreak for RedSn0w
Zain, they kicked him out ,, a base spying on the world, and when they expelled him, he started crying and talking about the cruelty of Apple !!
True people are not ashamed !!!
God willing, this is how you write Mo, God willing
I think Apple is losing consumer confidence
And it strengthens other companies
The reason is due to the sincerity of programmers
Why lose the confidence of consumers in part and less than a part. A program designer that delivers your pictures and everything to the mobile and says this is cruelty, by God, you are cruel on the day you respond like this. You encourage a hacker who designs programs to penetrate the iPhone in the first place. This article is all worthy of money
I believed .. the article, his village, and I wished his last wish to be Halashi against Halajban .. I don’t know and what do you feel about it and his book .. And if it is correct, this book on Apple would have banned it and a case was filed and a great Hillman worked .. Bought, bought, really hard, you have no need
IOS is the best system, but it lacks capabilities
By the way, the book is in iBooks itself and costs $ XNUMX
The book is very expensive
(Personally, I am satisfied with iPhone Islam’s reports on harmful programs, and that is enough.)
I am completely far from the jailbreak at this time, which I think is the cause, so every misfortune is
Apple cannot close all the loopholes because these loopholes are difficult to find
What you say is true, because any system in the world is an open system, such as the system of Apple, Microsoft, and others, a system in which the user can modify it, such as what is on the iPhone and laptop, a system that is easy for hackers to penetrate, but when it is a closed system, such as those in banks and major companies, it is difficult to penetrate because it is an internal system with no possibility of entry. After the vulnerabilities, how are they detected? Because any system that has the ability to download and send data, such as Windows desktop, iOS, etc., vulnerabilities are created through this portal, and as long as there is data exchange, make sure that it has vulnerabilities, and that is why companies constantly update their systems.
Dear teacher, correct your information
Apple and Microsoft systems are all closed source systems
The most popular open source systems are the Google Android system for smartphones and the Linux computer system
Thank you for the beautiful subject ;)
God willing, the security systems will win
Hi
Really, $ XNUMX million news. Every person wishes to hack Apple to see how their thinking is, as they truly are a mighty company
Give you. Wellness Bssss in English book
What is the most difficult construction and how easy it is to demolish
I think the war is continuing, thank you ..
Nice, but if the steps are practical it is of no use because Apple will shut everything down
But if it explains in detail the basics of the system, this is fine, but it requires programming experience
The Apple system is the most powerful system, so it is difficult to penetrate
Poor Charlie Apple fired him 😓
God willing, the security systems will prevail
I'm with you, Lulu
The book actually does, as many consider it a revolution, but it does not teach you how to do a hack or how to discover vulnerabilities! I was one of the first to get the book, and I saw that it only tells you the basics that it is difficult for the average user to understand, and for the novice programmer as well, because it needs to be understood by at least someone who is an amateur in programming. And this is my view on the book and there is a lot about it, which I will try to Arabize and work with some people, each of them has one of its units to end quickly
……
A sincere brother, may God bless you and many others like you .. Will you publish it on the Arab Div Team Blog or where?
Brother Mukhlis is one of the people who used to say it is impossible to install Siri on any device other than the Fur S, and he is very determined to his opinion and now it has been issued in more than one way
No, brother, I did not say that it is impossible, with the evidence that I am the first one working on the subject of an installation that will be partially seen in the Arab Div Team blog and the Apple community before
And the subject succeeded, but the rest of the connection was with the server
I just said it could harm the iPhone 4S if we took the keys away from it
And I'm the first one to house a subject pulling the key
I never said impossible ?????
Ok people, we want a translation of the book