本帖最后由 ken 于 2015-9-18 00:00 编辑
IOS应用安全(一): 搭建一个移动渗透测试环境
IOS应用安全(二):获取IOS应用的class信息
IOS应用安全(三): 理解Objective-C Runtime
IOS应用安全(四): 用Cycript分析Runtime
IOS应用安全(五):高级Runtime分析和操作
IOS 应用安全(六): IOS 7的新特性
IOS应用安全(七): 无需开发者账号安装任意程序
iOS Application Security Part 8 - Method Swizzling using Cycript
iOS Application Security Part 9 – Analyzing Security of iOS Applications using Snoop-it
iOS Application Security Part 10 – iOS Filesystem and Forensics
iOS Application Security Part 11 – Analyzing Network Traffic over HTTP/HTTPS
iOS Application Security Part 12 – Dumping Keychain Data
iOS Application Security Part 13 – Booting a custom Ramdisk using Sogeti Data Protection tools
iOS Application Security Part 14 – Gathering information using Sogeti Data Protection tools
iOS Application Security Part 15 – Static Analysis of iOS Applications using iNalyzer
iOS Application Security Part 16 – Runtime Analysis of iOS Applications using iNalyzer
iOS Application Security Part 17 – Black-Box Assessment of iOS Applications using INTROSPY
iOS Application Security Part 18 – Detecting custom signatures with Introspy
iOS Application Security Part 19 – Programmatical Usage of Introspy
iOS Application Security Part 20 – Local Data Storage (NSUserDefaults
iOS Application Security Part 21 – ARM and GDB Basics
iOS Application Security Part 22 – Runtime Analysis and Manipulation using GDB
iOS Application Security Part 23 – Defending against runtime analysis and manipulation
iOS Application Security Part 24 – Jailbreak Detection and Evasion
iOS Application Security Part 25 – Secure Coding Practices for iOS Development
iOS Application Security Part 26 – Patching iOS Applications using IDA Pro and Hex Fiend
iOS Application Security Part 27 - Setting up a mobile pentesting environment with iOS 7 Jailbreak
iOS Application Security Part 28 - Patching iOS Application with Hopper
iOS Application Security Part 29 - Insecure or Broken Cryptography
iOS Application Security Part 30 - Attacking URL schemes
iOS Application Security Part 31 - The problem with using third party libraries for securing your apps
iOS Application Security Part 33 - Writing tweaks using Theos (Cydia Substrate)
iOS Application Security Part 33 - Writing tweaks using Theos (Cydia Substrate)
iOS Application Security Part 34 - Tracing Method calls using Logify
iOS Application Security Part 35 – Auditing iOS Applications With iDB
iOS Application Security Part 36 – Bypassing certificate pinning using SSL Kill switch
iOS Application Security Part 37 - Adapting to iOS 8
iOS Application Security Part 38 - Attacking apps using Parse (Guest Lecture by Egor Tolstoy)
iOS Application Security Part 39 – Sensitive information in memory
iOS Application Security Part 40 - Testing apps on your Mac
iOS Application Security Part 40 - Testing apps on your Mac
iOS Application Security Part 41 - Debugging applications using LLDB
iOS Application Security Part 42 - LLDB Usage continued
iOS Application Security Part 43 - FAT binaries & LLDB usage continued
iOS Application Security Part 44 - Bypassing Jailbreak detection using Xcon
|