本帖最后由 ken 于 2015-9-18 00:00 编辑  
 
IOS应用安全(一): 搭建一个移动渗透测试环境 
IOS应用安全(二):获取IOS应用的class信息 
IOS应用安全(三): 理解Objective-C Runtime 
IOS应用安全(四): 用Cycript分析Runtime 
IOS应用安全(五):高级Runtime分析和操作 
IOS 应用安全(六): IOS 7的新特性 
IOS应用安全(七): 无需开发者账号安装任意程序 
iOS Application Security Part 8 - Method Swizzling using Cycript 
iOS Application Security Part 9 – Analyzing Security of iOS Applications using Snoop-it 
iOS Application Security Part 10 – iOS Filesystem and Forensics 
iOS Application Security Part 11 – Analyzing Network Traffic over HTTP/HTTPS 
iOS Application Security Part 12 – Dumping Keychain Data 
iOS Application Security Part 13 – Booting a custom Ramdisk using Sogeti Data Protection tools 
iOS Application Security Part 14 – Gathering information using Sogeti Data Protection tools 
iOS Application Security Part 15 – Static Analysis of iOS Applications using iNalyzer 
iOS Application Security Part 16 – Runtime Analysis of iOS Applications using iNalyzer 
iOS Application Security Part 17 – Black-Box Assessment of iOS Applications using INTROSPY 
iOS Application Security Part 18 – Detecting custom signatures with Introspy 
iOS Application Security Part 19 – Programmatical Usage of Introspy 
iOS Application Security Part 20 – Local Data Storage (NSUserDefaults 
iOS Application Security Part 21 – ARM and GDB Basics 
iOS Application Security Part 22 – Runtime Analysis and Manipulation using GDB 
iOS Application Security Part 23 – Defending against runtime analysis and manipulation 
iOS Application Security Part 24 – Jailbreak Detection and Evasion 
iOS Application Security Part 25 – Secure Coding Practices for iOS Development 
iOS Application Security Part 26 – Patching iOS Applications using IDA Pro and Hex Fiend 
iOS Application Security Part 27 - Setting up a mobile pentesting environment with iOS 7 Jailbreak 
iOS Application Security Part 28 - Patching iOS Application with Hopper 
iOS Application Security Part 29 - Insecure or Broken Cryptography 
iOS Application Security Part 30 - Attacking URL schemes 
iOS Application Security Part 31 - The problem with using third party libraries for securing your apps 
iOS Application Security Part 33 - Writing tweaks using Theos (Cydia Substrate) 
iOS Application Security Part 33 - Writing tweaks using Theos (Cydia Substrate) 
iOS Application Security Part 34 - Tracing Method calls using Logify 
iOS Application Security Part 35 – Auditing iOS Applications With iDB 
iOS Application Security Part 36 – Bypassing certificate pinning using SSL Kill switch 
iOS Application Security Part 37 - Adapting to iOS 8 
iOS Application Security Part 38 - Attacking apps using Parse (Guest Lecture by Egor Tolstoy) 
iOS Application Security Part 39 – Sensitive information in memory 
iOS Application Security Part 40 - Testing apps on your Mac 
iOS Application Security Part 40 - Testing apps on your Mac 
iOS Application Security Part 41 - Debugging applications using LLDB 
iOS Application Security Part 42 - LLDB Usage continued 
iOS Application Security Part 43 - FAT binaries & LLDB usage continued 
iOS Application Security Part 44 - Bypassing Jailbreak detection using Xcon 
 
 
 
 
 
 |