About Course
This course is created with an idea of saying Bye Bye to outdated iOS application penetration testing tools and techniques. Let us learn iOS Application Penetration Testing the right way with right tools and techniques.
This course introduces students to the security concepts associated with iOS Apps developed using Objective-C (Swift iOS Apps are not used in the course). This is an intermediate level course, which begins with beginner level concepts. This course covers a variety of concepts such as iOS Application structure, Reversing iOS Apps using Hopper, Bypassing client side restrictions such as Jailbreak detection, SSL Pinning etc. This course uses two vulnerable applications developed by the instructor to demonstrate how iOS App vulnerabilities can be identified and exploited. This course teaches you how to identify a variety of iOS App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Jailbreak detection, insecure end to end encryption, SQL Injection etc.
The best part of the course is that you will get a detailed understanding of how to trace an iOS app's runtime and write a bunch of Frida scripts to pentest the target applications
What do you learn?
Learn the fundamentals of iOS Application Penetration Testing
Learn how to Reverse Engineer iOS Apps using Hopper
Learn how to patch iOS Apps using Hopper to bypass SSL Pinning
Learn how to trace HTTP calls of an iOS app using Frida
Learn iOS Application Penetration Testing using the modern day tools and techniques - Good Bye to old school tools
Learn how to pentest iOS Applications built using Objective-C
Learn how to patch iOS Apps using Hopper to bypass Jailbreak detection
Learn how to bypass Jailbreak detection in iOS Apps using objection
Learn how to trace crypto calls made by an iOS app using Frida
Learn Mobile App Pentesting to begin your bug bounty journey
Prerequisite
This course covers all the required basics
Penetration testing knowledge is good to have
Who is this course for?
Penetration testers
Mobile Application Developers
Security Professionals who are interested in Mobile App Security
Anyone who is interested in ethical hacking and penetration testing
Anyone who is interested in information security concepts
Course Curriculum
- Introduction (0:51)
- Challenges with iOS lab setup (5:36)
- Lab setup using a Jailbroken iDevice (9:57)
- Installing Vulnerable Apps on a Jailbroken iDevice (13:51)
- Lab setup using a Non Jailbroken iDevice - Part 1 (4:08)
- Lab setup using a Non Jailbroken iDevice - Part 2 (6:28)
- Signing and Installing a third party application (3:30)
- Introduction (0:59)
- Introduction to iOS Application Pentesting (2:08)
- Introduction to iOS traffic analysis (9:23)
- Insecure Local Data Storage vulnerabilities (10:58)
- Insecure Local Data Storage vulnerabilities - Non Jailbroken devices (5:48)
- Dumping secrets from keychain (6:25)
- Introduction to server side vulnerabilities - Part 1 (1:32)
- Introduction to server side vulnerabilities - Part 2 (3:03)
- Introduction to client side vulnerabilities (0:51)
- Authorization Vulnerabilties (6:56)
- Insecure Logging (2:17)
- 23.pasteboard (1:49)
- WebView XSS (1:38)
- Introduction (1:25)
- Decrypting iOS Applications downloaded from App Store (6:34)
- Introducing SecureStorev2 (7:01)
- Dumping class information (5:37)
- Jailbreak detection bypass using Objection (4:12)
- Revisiting Insecure Local Data Storage (2:31)
- Revisiting Traffic Analysis (3:16)
- Introduction to Frida (1:08)
- Introduction to Frida CLI (2:33)
- Introduction to frida-trace (5:31)
- Writing Frida scripts to trace http calls (14:15)
- Introduction to end to end encryption (8:30)
- Tracing crypto calls and dealing with end-to-end encryption (12:22)
- Using objection to dump crypto keys (3:53)
- Dumping heap using objection (3:06)
- Introduction to Hopper (0:49)
- Bypassing jailbreak detection using Hopper - iOS Application Patching (13:34)
- Introduction to SSL Pinning (4:36)
- iOS Application Patching - Bypassing SSL Pinning using Hopper (6:48)