IOS Ing I OS Hacking Guide
iOS%20Hacking%20Guide
iOS%20Hacking%20Guide
iOS%20Hacking%20Guide
iOS%20Hacking%20Guide
iOS%20Hacking%20Guide
User Manual: Pdf
Open the PDF directly: View PDF
Page Count: 139 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- 1. Setting Up iOS Pentest Lab
- 2. Acquiring iOS Binaries
- 3. Generating iOS Binary (.IPA file) from Xcode Source Code:
- 4. Installing iOS Binaries on Physical Devices
- 5. iOS Binary Package Primer
- 5.1 Understanding the iOS Binary Package Structure
- 5.2 Understanding the Supported Architectures for the Provided Application
- 5.3 Understanding the Architecture Available on the Test Devices
- 5.4 Converting Application Binaries from FAT Binary to Specific Architecture Binary
- 5.5 Converting Pre-iOS 9 Executables to an iOS 9 Executable
- 5.6 Converting 32 Bit Applications into 64 Bit Applications in Xcode
- 6. Compiling Customer-Provided Source Code for Pentesting on Latest iOS Using Xcode
- 7. iOS Security Model Primer
- 8. Exploring iOS File System
- 9. Application Data Encryption
- 10. Binary Analysis
- 10.1 Binary Analysis – Check for Exploit Mitigations – Position Independent Executable (PIE & ASLR)
- 10.2 Binary Analysis – Check for Exploit Mitigations – Automatic Reference Counting (ARC)
- 10.3 Binary Analysis – Check for Exploit Mitigations – Stack Protectors
- 10.4 Binary Analysis – List All Libraries Used in the iOS Binary
- 10.5 Simple Reverse Engineering iOS Binaries Using class-dump-z
- 11. Decrypting iOS Applications (AppStore Binaries)
- 12. iOS Application Debugging - Runtime Manipulation
- 13. Reverse Engineering Using Hopper
- 14. Reverse Engineering Using IDA PRO
- 15. MITM on iOS
- 16. Side Channel Leakage