Complete course on how to perform a Black-box audit of an iOS Application, and how to modify, tamper and hack its functionality.

Duration

Duration

50 hours

Eligibility

Eligibility

Knowledge of C, Java, ethical hacking, Web Application Penetration testing(WAPT) and an iOS device.
Details of WAPT can be obtained here:- Web Application Penetration Testing

Course Fees

Course Fees

Rs.22,000/-

+ 18% GST

Course Details

Introduction to iOS Security
  • iOS Platform Basics
    • iOS Application Development and Testing
    • Objective C and iOS Frameworks
  • iOS Platform Security
  • Secure Boot
  • Application Code Signing and Appstore restrictions
  • Application Sandboxing
  • Encryption and Data Security
  • Secure Network Access
Creating an Application Pentest Platform
  • iOS – Platform Constraints and Limitations
  • Jailbreaking – Why and How?
  • History of Jailbreaking exploits
  • Cydia and other 3rd party repositories
  • Installing Assessment Tools on your iPhone
    • Filesystem analysis
    • Runtime analysis
    • Debugging and Dis-assembling
    • Network Monitoring – proxies, raw traffic dumps
  • Sqlite basics
  • Plist basics and Plutil
  • Class-Dump
Exploiting iOS Applications
  • Examining Application Data Storage at Runtime
    • Plist and XML files
    • Sqlite Data
    • Keychain
    • Core Data Services
    • Temporary files
    • Directory Structure and Snapshot Analysis
  • Insecure Local Data Storage
    • Plist, XML, Sqlite, Temp Files etc.
  • Information leakage using log files
  • Keychain Data Storage and Security
  • Data and File Security
  • Improper Encryption
  • Breaking Authentication and Authorization
  • Insecure Session Management
iOS Forensics
  • Filesystem Organization in iOS
  • Understanding Disk and File Encrption
  • Forensics on non-Jailbroken devices
  • PIN brute-forcing on the device
  • Forensics on Jailbroken devices
Advanced Application Behavior Modification
  • Runtime Application Modification
  • Overriding and Overloading of Objective-C functions and their return values
  • Memory modification and hacking
  • Hacking using Proxy servers
  • In-App Purchase cracking using Proxy server and customized receipts
  • Application Behaviour Modification by modification of Core-system files
  • Application Behaviour Modification by using runtime patchers and Dynamic Libraries
  • UUID Patching
  • Licensing Patching
Test App-to-Server Communication
  • Monitoring API Calls
  • Setting up transparent and non-transparent proxies
  • Setting up Trusted Licenses, and Trusted CAs
  • Routing traffic of Apple's own services via Proxy
  • Fuzzing of App-to-Server communication
  • Testing for conventional vulnerabilities like SQLi and CSRF
Cydia and Cydia Substrate
  • What is Cydia?
  • What is Cydia Substrate?
  • Dynamic Libraries
  • Modifying startup behaviour
  • iOS Daemons, their purposes and disabling them
Case Study

 

Enroll Now

Fields marked with * are mandatory.

Workshop Seminar Newspaper Internet Facebook Others