[转]iOS hacking resource collection
Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/
A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
|
Title |
Year |
Author |
Download link |
|
Fuzzing the Phone in your Phone |
2009 |
Charlie Miller & |
Paper |
|
iPhone security model & vulnerabilities |
2010 |
Cedric Halbronn & |
|
|
iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility |
2010 |
Mona Bader & Ibrahim Baggili |
Paper |
|
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 |
2011 |
Andrey Belenko & Dmitry Sklyarov |
Slides |
|
iPhone Forensics on iOS 5 |
2011 |
Satishb3 |
Paper, Video |
|
Forensic Analysis of iOS Backups |
2011 |
Satishb3 |
Paper, Video |
|
Overcoming iOS data protection to re-enable iPhone Forensics |
2011 |
Andrey Belenko |
|
|
Apple iOS 4 Security Evaluation |
2011 |
Dino A. Dai Zovi |
|
|
Practical Consideration of iOS Device |
2011 |
Jens Heider & Matthias Boll |
|
|
iPhone data protection in depth |
2011 |
Jean-Baptiste Bedrune & Jean Sigwald |
|
|
Exploiting The iOS Kernel |
2011 |
Stefan Esser |
|
|
iOS Kernel Exploitation – IOKIT Edition |
2011 |
Stefan Esser |
|
|
Targeting the iOS kernel |
2011 |
Stefan Esser |
|
|
The Apple Sandbox |
2011 |
Dionysus Blazakis |
|
|
The iOS MDM Protocol |
2011 |
David Schuetz |
|
|
iPhone Exploitation One ROPe to bind them all? |
2011 |
Stefan Esser |
|
|
iOS Forensics: Overcoming iPhone Data Protection |
2011 |
Andrey Belenko |
|
|
Handling iOS encryption in a forensic investigation |
2011 |
Jochem van Kerkwijk |
|
|
IPhone backup files. A penetration tester’s treasure |
2011 |
SANS |
|
|
iPhone Forensics with F/OSS |
2011 |
ViaForensics |
|
|
Evolution of iPhone Baseband and unlocks |
2012 |
MuscleNerd |
|
|
iPhone data protection in depth |
2012 |
Jean-baptiste.bedrune & Jean.sigwald |
|
|
Corona Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
iOS Security |
2012 |
Apple |
|
|
Absinthe Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
Breaking iOS code signing |
2012 |
Charlie Miller |
|
|
Overview on Apple iOS Security |
2012 |
Ahmad Reza Sadeghi |
|
|
iOS 5 – an exploitation night mare |
2012 |
Stefan Esser |
|
|
Jailbreaking Techniques |
2012 |
Pod2g |
|
|
iOS 6 kernel security: A Hacker’s guide |
2012 |
Mark Dowd & |
|
|
Swiping Through Modern Security Features |
2013 |
evad3rs |
|
|
iOS 6 Exploitation 280 days later |
2013 |
stefan esser |
|
| iOS Vulnerabilities Garage Sale |
2013 |
stefan esser |
|
|
Hacking Apple Accessories to pown iDevices |
2013 |
Mathieu Renard |
|
|
Injecting Malware into iOS Devices via Malicious Chargers |
2013 |
Billy Lau & Yeongjin Jang & Chengyu Song |
iOS Hardening
|
Title |
Year |
Author |
Download link |
|
iOS Hardening Configuration Guide |
2012 |
Australian Government |
|
|
Apple iOS Security in the Enterprise |
2012 |
Oliver Karow |
iOS Application Hacking
|
Title |
Year |
Author |
Download link |
|
Penetration testing of iPhone/iPad applications |
2010 |
Kunjan Shah |
|
|
New age application attacks against Apple iOS and countermeasures |
2011 |
Nitesh Dhanjani |
|
|
Hacking and Securing Next Generation iPhone and iPad Apps |
2011 |
Nitesh Dhanjani & Sean Pennline |
|
|
Secure Development on iOS – Advice for developers and penetration testers |
2011 |
David Thiel |
|
|
Pentesting iPhone & iPad Apps |
2011 |
Flora Bottaccio & |
|
|
Detecting Privacy Leaks in iOS Applications |
2011 |
Manuel Egeley, Christopher Kruegel, Engin Kirdaz & |
|
|
Evaluating iOS Applications |
2011 |
Dominic Chell |
|
|
iOS applications reverse engineering |
2011 |
Julien Bachmann |
|
|
Attacking iPhone & iPad Applications |
2011 |
Sebastien Andrivet |
|
|
Pentesting iPhone applications |
2011 |
Satishb3 |
|
|
iOS Application (In)Security |
2012 |
Dominic Chell |
|
|
Auditing iPhone and iPad applications |
2012 |
Ilja van Sprundel |
|
|
iOS SSL kill switch |
2012 |
Justine Osborne & |
|
|
Smart Phones Security |
2012 |
Tomáš Rosa |
|
|
Hacking and securing iOS applications |
2012 |
Satishb3 |
|
|
Attacking iPhone Applications |
2012 |
Chilik Tamir |
|
|
Practical iOS Applications Hacking |
2012 |
Mathieu RENARD |
|
|
Pentesting iOS Apps Runtime Analysis and |
2012 |
Andreas Kurtz |
|
|
Pentesting iOS Applications |
2013 |
Jason Haddix |
|
|
iAnalyzer-No More Blackbox iOS Analysis |
2013 |
Chilik Tamir |
|
|
Protecting Sensitive information on iOS devices |
2013 |
Darth Null |
|
|
How to assess and secure iOS apps |
2013 |
NccGroup |
Best Sites:
1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/
Best Books:
1. Hacking and Securing iOS Applications
2. iOS Hackers hand book
[转]iOS hacking resource collection的更多相关文章
- IOS UIView 03- 自定义 Collection View 布局
注:本人是翻译过来,并且加上本人的一点见解. 前言 UICollectionView 在 iOS6 中第一次被引入,也是 UIKit 视图类中的一颗新星.它和 UITableView 共享一套 API ...
- IOS 从Resource文件夹下Copy文件到沙盒
- (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view. self.t ...
- [RN] 03 - Resource Collection & AWS Auth
那些资源 一.三个例子 iReading Bilibili-React-Native ZhiHuDaily-React-Native 二.IM 例子 1. React Native Socket.io ...
- iOS 添加Resource bundle target(静态库中使用图片等资源)
一.首先将资源文件打包成bundle 新建工程:File -> New -> Project... -> OS X -> Framework & Library -&g ...
- 升级Xcode或 MacOS编译iOS出现resource fork, Finder information, or similar detritus not allowed
很久没有在网上留下足迹了,冒个泡吧 最近升级了Xcode,编译之前的一个项目是出现问题,问题结尾如下: resource fork, Finder information, or similar de ...
- iOS tableview和 Collection复用机制
TableView的重用机制,为了做到显示和数据分离, tableView的实现并且不是为每个数据项创建一个tableCell.而是只创建屏幕可显示最大个数的cell,然后重复使用这些cell,对ce ...
- The Qt Resource System
The Qt Resource System The Qt resource system is a platform-independent mechanism for storing binary ...
- REST Representational state transfer REST Resource Naming Guide Never use CRUD function names in URIs
怎样用通俗的语言解释什么叫 REST,以及什么是 RESTful? - 知乎 https://www.zhihu.com/question/28557115 大家都知道"古代"网 ...
- iOS本地化
本地化与相机中显示英文 工程PROJECT -> info ->Localizations 添加相应的国际化语言 一.当你发现相机中显示英文,可以通过它设置 添加一项“Localize ...
随机推荐
- 6天通吃树结构—— 第五天 Trie树
原文:6天通吃树结构-- 第五天 Trie树 很有段时间没写此系列了,今天我们来说Trie树,Trie树的名字有很多,比如字典树,前缀树等等. 一:概念 下面我们有and,as,at,cn,com这些 ...
- oracle_分区表的新增、修改、删除、合并。普通表转分区表方法
一. 分区表理论知识Oracle提供了分区技术以支持VLDB(Very Large DataBase).分区表通过对分区列的判断,把分区列不同的记录,放到不同的分区中.分区完全对应用透明. Oracl ...
- Sql使用视图(简单的视图)适合入门-level
创建以便从库更好的数据呼叫和一个数据库,以(例如,该209东东库转移205图书馆) 例:209图书馆有不同的库名:数据库(AIS20140417092531电影库)供应商表(t_Supplier ). ...
- 用fcntl()设置堵塞函数的堵塞性质
#include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/types. ...
- CSharp设计模式读书笔记(20):观察者模式(学习难度:★★★☆☆,使用频率:★★★★★)
观察者模式(Observer Pattern):定义对象之间的一种一对多依赖关系,使得每当一个对象状态发生改变时,其相关依赖对象皆得到通知并被自动更新.观察者模式的别名包括发布-订阅(Publish/ ...
- 异步编程(Async和Await)的使用
.net4.5新特性之异步编程(Async和Await)的使用 一.简介 首先来看看.net的发展中的各个阶段的特性:NET 与C# 的每个版本发布都是有一个“主题”.即:C#1.0托管代码→C#2. ...
- 左右lcm,gcd一些性质
两个整数a,b 他们的最大公约数为n 最小公倍数为m 则有 a,b都能分解为有限个素数的积 12 = 2^2 * 3^1 * 5^0 , 30 = 2^1 * 3^1 ...
- java设计模式之十桥接模式(Bridge)
桥接模式就是把事物和其具体实现分开,使他们可以各自独立的变化.桥接的用意是:将抽象化与实现化解耦,使得二者可以独立变化,像我们常用的JDBC桥DriverManager一样,JDBC进行连接数据库的时 ...
- EA强大的绘图工具---设计数据库表格
关于EA这个优秀的软件是从师哥哪里听来的,自己瞎点了点,感觉也没什么.近期和和智福加上一个师哥合作敲机房收费系统时,想到之前听人说EA非常强大,便随便找了找关于EA使用的帮助手冊.果然惊喜-- 如题, ...
- PE文件结构(五岁以下儿童)基地搬迁
PE文件结构(五岁以下儿童) 參考 书:<加密与解密> 视频:小甲鱼 解密系列 视频 基址重定位 链接器生成一个PE文件时,它会如果程序被装入时使用的默认ImageBase基地址(VC默认 ...