[转]iOS hacking resource collection
Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/
A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
|
Title |
Year |
Author |
Download link |
|
Fuzzing the Phone in your Phone |
2009 |
Charlie Miller & |
Paper |
|
iPhone security model & vulnerabilities |
2010 |
Cedric Halbronn & |
|
|
iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility |
2010 |
Mona Bader & Ibrahim Baggili |
Paper |
|
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 |
2011 |
Andrey Belenko & Dmitry Sklyarov |
Slides |
|
iPhone Forensics on iOS 5 |
2011 |
Satishb3 |
Paper, Video |
|
Forensic Analysis of iOS Backups |
2011 |
Satishb3 |
Paper, Video |
|
Overcoming iOS data protection to re-enable iPhone Forensics |
2011 |
Andrey Belenko |
|
|
Apple iOS 4 Security Evaluation |
2011 |
Dino A. Dai Zovi |
|
|
Practical Consideration of iOS Device |
2011 |
Jens Heider & Matthias Boll |
|
|
iPhone data protection in depth |
2011 |
Jean-Baptiste Bedrune & Jean Sigwald |
|
|
Exploiting The iOS Kernel |
2011 |
Stefan Esser |
|
|
iOS Kernel Exploitation – IOKIT Edition |
2011 |
Stefan Esser |
|
|
Targeting the iOS kernel |
2011 |
Stefan Esser |
|
|
The Apple Sandbox |
2011 |
Dionysus Blazakis |
|
|
The iOS MDM Protocol |
2011 |
David Schuetz |
|
|
iPhone Exploitation One ROPe to bind them all? |
2011 |
Stefan Esser |
|
|
iOS Forensics: Overcoming iPhone Data Protection |
2011 |
Andrey Belenko |
|
|
Handling iOS encryption in a forensic investigation |
2011 |
Jochem van Kerkwijk |
|
|
IPhone backup files. A penetration tester’s treasure |
2011 |
SANS |
|
|
iPhone Forensics with F/OSS |
2011 |
ViaForensics |
|
|
Evolution of iPhone Baseband and unlocks |
2012 |
MuscleNerd |
|
|
iPhone data protection in depth |
2012 |
Jean-baptiste.bedrune & Jean.sigwald |
|
|
Corona Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
iOS Security |
2012 |
Apple |
|
|
Absinthe Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
Breaking iOS code signing |
2012 |
Charlie Miller |
|
|
Overview on Apple iOS Security |
2012 |
Ahmad Reza Sadeghi |
|
|
iOS 5 – an exploitation night mare |
2012 |
Stefan Esser |
|
|
Jailbreaking Techniques |
2012 |
Pod2g |
|
|
iOS 6 kernel security: A Hacker’s guide |
2012 |
Mark Dowd & |
|
|
Swiping Through Modern Security Features |
2013 |
evad3rs |
|
|
iOS 6 Exploitation 280 days later |
2013 |
stefan esser |
|
| iOS Vulnerabilities Garage Sale |
2013 |
stefan esser |
|
|
Hacking Apple Accessories to pown iDevices |
2013 |
Mathieu Renard |
|
|
Injecting Malware into iOS Devices via Malicious Chargers |
2013 |
Billy Lau & Yeongjin Jang & Chengyu Song |
iOS Hardening
|
Title |
Year |
Author |
Download link |
|
iOS Hardening Configuration Guide |
2012 |
Australian Government |
|
|
Apple iOS Security in the Enterprise |
2012 |
Oliver Karow |
iOS Application Hacking
|
Title |
Year |
Author |
Download link |
|
Penetration testing of iPhone/iPad applications |
2010 |
Kunjan Shah |
|
|
New age application attacks against Apple iOS and countermeasures |
2011 |
Nitesh Dhanjani |
|
|
Hacking and Securing Next Generation iPhone and iPad Apps |
2011 |
Nitesh Dhanjani & Sean Pennline |
|
|
Secure Development on iOS – Advice for developers and penetration testers |
2011 |
David Thiel |
|
|
Pentesting iPhone & iPad Apps |
2011 |
Flora Bottaccio & |
|
|
Detecting Privacy Leaks in iOS Applications |
2011 |
Manuel Egeley, Christopher Kruegel, Engin Kirdaz & |
|
|
Evaluating iOS Applications |
2011 |
Dominic Chell |
|
|
iOS applications reverse engineering |
2011 |
Julien Bachmann |
|
|
Attacking iPhone & iPad Applications |
2011 |
Sebastien Andrivet |
|
|
Pentesting iPhone applications |
2011 |
Satishb3 |
|
|
iOS Application (In)Security |
2012 |
Dominic Chell |
|
|
Auditing iPhone and iPad applications |
2012 |
Ilja van Sprundel |
|
|
iOS SSL kill switch |
2012 |
Justine Osborne & |
|
|
Smart Phones Security |
2012 |
Tomáš Rosa |
|
|
Hacking and securing iOS applications |
2012 |
Satishb3 |
|
|
Attacking iPhone Applications |
2012 |
Chilik Tamir |
|
|
Practical iOS Applications Hacking |
2012 |
Mathieu RENARD |
|
|
Pentesting iOS Apps Runtime Analysis and |
2012 |
Andreas Kurtz |
|
|
Pentesting iOS Applications |
2013 |
Jason Haddix |
|
|
iAnalyzer-No More Blackbox iOS Analysis |
2013 |
Chilik Tamir |
|
|
Protecting Sensitive information on iOS devices |
2013 |
Darth Null |
|
|
How to assess and secure iOS apps |
2013 |
NccGroup |
Best Sites:
1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/
Best Books:
1. Hacking and Securing iOS Applications
2. iOS Hackers hand book
[转]iOS hacking resource collection的更多相关文章
- IOS UIView 03- 自定义 Collection View 布局
注:本人是翻译过来,并且加上本人的一点见解. 前言 UICollectionView 在 iOS6 中第一次被引入,也是 UIKit 视图类中的一颗新星.它和 UITableView 共享一套 API ...
- IOS 从Resource文件夹下Copy文件到沙盒
- (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view. self.t ...
- [RN] 03 - Resource Collection & AWS Auth
那些资源 一.三个例子 iReading Bilibili-React-Native ZhiHuDaily-React-Native 二.IM 例子 1. React Native Socket.io ...
- iOS 添加Resource bundle target(静态库中使用图片等资源)
一.首先将资源文件打包成bundle 新建工程:File -> New -> Project... -> OS X -> Framework & Library -&g ...
- 升级Xcode或 MacOS编译iOS出现resource fork, Finder information, or similar detritus not allowed
很久没有在网上留下足迹了,冒个泡吧 最近升级了Xcode,编译之前的一个项目是出现问题,问题结尾如下: resource fork, Finder information, or similar de ...
- iOS tableview和 Collection复用机制
TableView的重用机制,为了做到显示和数据分离, tableView的实现并且不是为每个数据项创建一个tableCell.而是只创建屏幕可显示最大个数的cell,然后重复使用这些cell,对ce ...
- The Qt Resource System
The Qt Resource System The Qt resource system is a platform-independent mechanism for storing binary ...
- REST Representational state transfer REST Resource Naming Guide Never use CRUD function names in URIs
怎样用通俗的语言解释什么叫 REST,以及什么是 RESTful? - 知乎 https://www.zhihu.com/question/28557115 大家都知道"古代"网 ...
- iOS本地化
本地化与相机中显示英文 工程PROJECT -> info ->Localizations 添加相应的国际化语言 一.当你发现相机中显示英文,可以通过它设置 添加一项“Localize ...
随机推荐
- 【从翻译mos文章】oracle linux 和外部存储系统 关系
oracle linux 和外部存储系统 关系 参考原始: Oracle Linux and External Storage Systems (Doc ID 753050.1) 范围: Linux ...
- php_cawler_html嵌套标签清洗
主要处理 嵌套 div,正则无法很好的处理清洗 比如文本: 想要移除 class =quizPutTag 的div ,内部可能嵌套的还有未知层级的div[前提是html文本段是闭合标签的] 这是< ...
- 蓝桥杯 BASIC 27 矩阵乘法(矩阵、二维数组)
[思路]:注意0次幂是单位矩阵. [AC代码]: #include <iostream> #include <algorithm> #include <iomanip&g ...
- C#二维码生成解析
C#二维码生成解析工具,可添加自定义Logo 二维码又称 QR Code,QR 全称 Quick Response,是一个近几年来移动设备上超流行的一种编码方式,它比传统的 Bar Code 条形码能 ...
- Facebook HHVM 和 Hack 手册----1.什么是Hack?
什么是Hack? Hack 是一种基于HHVM(HipHop VM 是Facebook推出的用来执行PHP代码的虚拟机,它是一个PHP的JIT编译器,同时具有产生快速代码和即时编译的优点)的新型编程语 ...
- java设计模式之八代理模式(Proxy)
其实每个模式名称就表明了该模式的作用,代理模式就是多一个代理类出来,替原对象进行一些操作,比如我们在租房子的时候回去找中介,为什么呢?因为你对该地区房屋的信息掌握的不够全面,希望找一个更熟悉的人去帮你 ...
- Codeforces 474A Keyboard (水
题目链接:点击打开链接 键盘移位了,问输出相应的字母 #include <cstdio> #include <cstring> char a[105]; char b[3][1 ...
- ios基金会-XCode温馨提示
(一个)代号规格pragma mark 1.定义 #pragma 开头的代码是一条编译器指令,是一个特定于程序或编译器的指令. 不一定适用于其他编译器或其他环境.假设编译器不能识别该指令.则会将其忽略 ...
- Node+Express+MongoDB + Socket.io搭建实时聊天应用
Node+Express+MongoDB + Socket.io搭建实时聊天应用 前言 本来开始写博客的时候只是想写一下关于MongoDB的使用总结的,后来觉得还不如干脆写一个node项目实战教程实战 ...
- uva 11529 - Strange Tax Calculation(计数问题)
题目链接:uva 11529 - Strange Tax Calculation 题目大意:给出若干个点,保证随意三点不共线.随意选三个点作为三角行,其它点若又在该三角形内,则算是该三角形内部的点.问 ...