Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/

A collection of iOS research presentations, videos and interesting papers-

iOS Hacking:

Title

Year

Author

Download link

Fuzzing the Phone in your Phone

2009

Charlie Miller &
Collin Mulliner

Paper

iPhone security model & vulnerabilities

2010

Cedric Halbronn &
Jean Sigwald

Slides

iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility

2010

Mona Bader &

Ibrahim Baggili

Paper

Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5

2011

Andrey Belenko &

Dmitry Sklyarov

Slides

iPhone Forensics on iOS 5

2011

Satishb3

PaperVideo

Forensic Analysis of iOS Backups

2011

Satishb3

PaperVideo

Overcoming iOS data protection to re-enable iPhone Forensics

2011

Andrey Belenko

Slides Paper

Apple iOS 4 Security Evaluation

2011

Dino A. Dai Zovi

Slides Paper

Practical Consideration of iOS Device
Encryption Security

2011

Jens Heider &

Matthias Boll

Paper

iPhone data protection in depth

2011

Jean-Baptiste Bedrune &

Jean Sigwald

Slides

Exploiting The iOS Kernel

2011

Stefan Esser

SlidesPaper

iOS Kernel Exploitation  –  IOKIT Edition

2011

Stefan Esser

Slides

Targeting the iOS kernel

2011

Stefan Esser

Slides

The Apple Sandbox

2011

Dionysus Blazakis

Paper

The iOS MDM Protocol

2011

David Schuetz

SlidesPaper

iPhone Exploitation One ROPe to bind them all?

2011

Stefan Esser

Slides

iOS Forensics: Overcoming iPhone Data Protection

2011

Andrey Belenko

Slides

Handling iOS encryption in a forensic investigation

2011

Jochem van Kerkwijk

Paper

IPhone backup files. A penetration tester’s treasure

2011

SANS

Paper

iPhone Forensics with F/OSS

2011

ViaForensics

Slides

Evolution of iPhone Baseband and unlocks

2012

MuscleNerd

Slides

iPhone data protection in depth

2012

Jean-baptiste.bedrune & Jean.sigwald

Slides

Corona Jailbreak for iOS 5.0.1

2012

Jailbreak Dream team

SlidesVideo

iOS Security

2012

Apple

Paper

Absinthe Jailbreak for iOS 5.0.1

2012

Jailbreak Dream team

SlidesVideo

Breaking iOS code signing

2012

Charlie Miller

Slides

Overview on Apple iOS Security

2012

Ahmad Reza Sadeghi

Slides

iOS 5 – an exploitation night mare

2012

Stefan Esser

Slides

Jailbreaking Techniques

2012

Pod2g

Slides

iOS 6 kernel security: A Hacker’s guide

2012

Mark Dowd &
Tarjei Mandt

Slides

Swiping Through Modern Security Features

2013

evad3rs

Slides

iOS 6 Exploitation 280 days later

2013

stefan esser

Slides

iOS Vulnerabilities Garage Sale

2013

stefan esser

Slides

Hacking Apple Accessories to pown iDevices

2013

Mathieu Renard

Slides

Injecting Malware into iOS Devices via Malicious Chargers

2013

Billy Lau & Yeongjin Jang & Chengyu Song

SlidesPaper

 

iOS Hardening

Title

Year

Author

Download link

iOS Hardening Configuration Guide

2012

Australian Government

Paper

Apple iOS Security in the Enterprise

2012

Oliver Karow

Paper

 

iOS Application Hacking

Title

Year

Author

Download link

Penetration testing of iPhone/iPad applications

2010

Kunjan Shah

Paper

New age application attacks against Apple iOS and countermeasures

2011

Nitesh Dhanjani

Paper

Hacking and Securing Next Generation iPhone and iPad Apps

2011

Nitesh Dhanjani  &

Sean Pennline

Slides

Secure Development on iOS – Advice for developers and penetration testers

2011

David Thiel

Slides

Pentesting iPhone & iPad Apps

2011

Flora Bottaccio &
Sebastien Andrivet

Slides

Detecting Privacy Leaks in iOS Applications

2011

Manuel Egeley, Christopher Kruegel, Engin Kirdaz  &
Giovanni Vigna

Paper

Evaluating iOS Applications

2011

Dominic Chell

Slides

iOS applications reverse engineering

2011

Julien Bachmann

Slides

Attacking iPhone & iPad Applications

2011

Sebastien Andrivet

Slides

Pentesting iPhone applications

2011

Satishb3

SlidesVideo

iOS Application (In)Security

2012

Dominic Chell

Slides,  Paper

Auditing iPhone and iPad applications

2012

Ilja van Sprundel

Slides

iOS SSL kill switch

2012

Justine Osborne &
Alban Diquet

Slides

Smart Phones Security

2012

Tomáš Rosa

Slides

Hacking and securing iOS applications

2012

Satishb3

Slides,  Video

Attacking iPhone Applications

2012

Chilik Tamir

Slides

Practical iOS Applications Hacking

2012

Mathieu RENARD

SlidesPaper

Pentesting iOS Apps Runtime Analysis and
Manipulation

2012

Andreas Kurtz

Slides

Pentesting iOS Applications

2013

Jason Haddix

Slides

iAnalyzer-No More Blackbox iOS Analysis

2013

Chilik Tamir

Slides

Protecting Sensitive information on iOS devices

2013

Darth Null

Video

How to assess and secure iOS apps

2013

NccGroup

Slides

 

Best Sites:

1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/

Best Books:

1. Hacking and Securing iOS Applications 
2. iOS Hackers hand book

 

[转]iOS hacking resource collection的更多相关文章

  1. IOS UIView 03- 自定义 Collection View 布局

    注:本人是翻译过来,并且加上本人的一点见解. 前言 UICollectionView 在 iOS6 中第一次被引入,也是 UIKit 视图类中的一颗新星.它和 UITableView 共享一套 API ...

  2. IOS 从Resource文件夹下Copy文件到沙盒

    - (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view. self.t ...

  3. [RN] 03 - Resource Collection & AWS Auth

    那些资源 一.三个例子 iReading Bilibili-React-Native ZhiHuDaily-React-Native 二.IM 例子 1. React Native Socket.io ...

  4. iOS 添加Resource bundle target(静态库中使用图片等资源)

    一.首先将资源文件打包成bundle 新建工程:File -> New -> Project... -> OS X -> Framework & Library -&g ...

  5. 升级Xcode或 MacOS编译iOS出现resource fork, Finder information, or similar detritus not allowed

    很久没有在网上留下足迹了,冒个泡吧 最近升级了Xcode,编译之前的一个项目是出现问题,问题结尾如下: resource fork, Finder information, or similar de ...

  6. iOS tableview和 Collection复用机制

    TableView的重用机制,为了做到显示和数据分离, tableView的实现并且不是为每个数据项创建一个tableCell.而是只创建屏幕可显示最大个数的cell,然后重复使用这些cell,对ce ...

  7. The Qt Resource System

    The Qt Resource System The Qt resource system is a platform-independent mechanism for storing binary ...

  8. REST Representational state transfer REST Resource Naming Guide Never use CRUD function names in URIs

    怎样用通俗的语言解释什么叫 REST,以及什么是 RESTful? - 知乎  https://www.zhihu.com/question/28557115 大家都知道"古代"网 ...

  9. iOS本地化

    本地化与相机中显示英文  工程PROJECT -> info ->Localizations 添加相应的国际化语言  一.当你发现相机中显示英文,可以通过它设置 添加一项“Localize ...

随机推荐

  1. 6天通吃树结构—— 第五天 Trie树

    原文:6天通吃树结构-- 第五天 Trie树 很有段时间没写此系列了,今天我们来说Trie树,Trie树的名字有很多,比如字典树,前缀树等等. 一:概念 下面我们有and,as,at,cn,com这些 ...

  2. oracle_分区表的新增、修改、删除、合并。普通表转分区表方法

    一. 分区表理论知识Oracle提供了分区技术以支持VLDB(Very Large DataBase).分区表通过对分区列的判断,把分区列不同的记录,放到不同的分区中.分区完全对应用透明. Oracl ...

  3. Sql使用视图(简单的视图)适合入门-level

    创建以便从库更好的数据呼叫和一个数据库,以(例如,该209东东库转移205图书馆) 例:209图书馆有不同的库名:数据库(AIS20140417092531电影库)供应商表(t_Supplier ). ...

  4. 用fcntl()设置堵塞函数的堵塞性质

    #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/types. ...

  5. CSharp设计模式读书笔记(20):观察者模式(学习难度:★★★☆☆,使用频率:★★★★★)

    观察者模式(Observer Pattern):定义对象之间的一种一对多依赖关系,使得每当一个对象状态发生改变时,其相关依赖对象皆得到通知并被自动更新.观察者模式的别名包括发布-订阅(Publish/ ...

  6. 异步编程(Async和Await)的使用

    .net4.5新特性之异步编程(Async和Await)的使用 一.简介 首先来看看.net的发展中的各个阶段的特性:NET 与C# 的每个版本发布都是有一个“主题”.即:C#1.0托管代码→C#2. ...

  7. 左右lcm,gcd一些性质

    两个整数a,b  他们的最大公约数为n  最小公倍数为m  则有 a,b都能分解为有限个素数的积               12 = 2^2 * 3^1 * 5^0 , 30 = 2^1 * 3^1 ...

  8. java设计模式之十桥接模式(Bridge)

    桥接模式就是把事物和其具体实现分开,使他们可以各自独立的变化.桥接的用意是:将抽象化与实现化解耦,使得二者可以独立变化,像我们常用的JDBC桥DriverManager一样,JDBC进行连接数据库的时 ...

  9. EA强大的绘图工具---设计数据库表格

    关于EA这个优秀的软件是从师哥哪里听来的,自己瞎点了点,感觉也没什么.近期和和智福加上一个师哥合作敲机房收费系统时,想到之前听人说EA非常强大,便随便找了找关于EA使用的帮助手冊.果然惊喜-- 如题, ...

  10. PE文件结构(五岁以下儿童)基地搬迁

    PE文件结构(五岁以下儿童) 參考 书:<加密与解密> 视频:小甲鱼 解密系列 视频 基址重定位 链接器生成一个PE文件时,它会如果程序被装入时使用的默认ImageBase基地址(VC默认 ...