¡@

Home 

2014/10/15 ¤U¤È 10:04:08

iphone Programming Glossary: attacks

Authenticating requests from mobile (iPhone) app to ASP.Net Web API (Feedback requested on my design)

http://stackoverflow.com/questions/11889556/authenticating-requests-from-mobile-iphone-app-to-asp-net-web-api-feedback-re

offer. My biggest concerns are Ensuring that calls made to the web API are authorized Minimizing the risk of replay attacks hence timestamps in the calls below The iPhone app will be developed as such Two strings are hard coded into the iPhone..

Problem using NSURLRequest to POST data to server

http://stackoverflow.com/questions/330060/problem-using-nsurlrequest-to-post-data-to-server

send RSA public key to iphone and use it to encrypt

http://stackoverflow.com/questions/4211484/send-rsa-public-key-to-iphone-and-use-it-to-encrypt

question This should do what you're asking it encrypts data with the server's public key. It's not subject to MITM attacks unless the attacker has a copy of your private key and its password communicating via non SSL however still is but the data.. resource bundle of your app obviously you can also download the cert from your server but then you're open to MITM attacks again . By default OpenSSL generates a PEM encoded cert so you have to convert it with openssl x509 in cert.pem inform PEM..

How to make a secure login using UDID or device token?

http://stackoverflow.com/questions/4671435/how-to-make-a-secure-login-using-udid-or-device-token

match the hashes. Not breakable by protocol analysis only by digging in the code for the string. Vulnerable to replay attacks though. For a stronger solution authenticate users not devices. This is up to your customers and depends on the nature of..

UITableViewCell, UITextView with dynamic height

http://stackoverflow.com/questions/4890054/uitableviewcell-uitextview-with-dynamic-height

Explanation of MProtect Errno 12 (ENOMEM)

http://stackoverflow.com/questions/5389947/explanation-of-mprotect-errno-12-enomem

so that buffer overflows format string vulnerabilities use after free or freeing unallocated memory errors or similar attacks cannot return into attacker supplied data. Also mprotect 2 is used to ensure that the program text space cannot be modified.. the functions you've supplied that's no good. But mprotect 2 isn't magic it cannot prevent against return to libc attacks or improper use of system 3 or other code interpreters etc. What is the C symbol for the errno value 12 on the iPhone Where..

Secure https encryption for iPhone app to webpage

http://stackoverflow.com/questions/9181186/secure-https-encryption-for-iphone-app-to-webpage

include one of two things Authenticating the user rather than the program or Continual vigilance watching for new attacks and responding with fixes that patch them. The latter is very expensive and never ends. Make sure it's worth it. Some other.. secret over SSL. Remember that if you don't verify the certificate you are subject to very easy man in the middle attacks. Readily available proxies like Charles can do this. The best approach is to make sure that the SSL certificate being returned..