[转]iOS hacking resource collection
Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/
A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
|
Title |
Year |
Author |
Download link |
|
Fuzzing the Phone in your Phone |
2009 |
Charlie Miller & |
Paper |
|
iPhone security model & vulnerabilities |
2010 |
Cedric Halbronn & |
|
|
iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility |
2010 |
Mona Bader & Ibrahim Baggili |
Paper |
|
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 |
2011 |
Andrey Belenko & Dmitry Sklyarov |
Slides |
|
iPhone Forensics on iOS 5 |
2011 |
Satishb3 |
Paper, Video |
|
Forensic Analysis of iOS Backups |
2011 |
Satishb3 |
Paper, Video |
|
Overcoming iOS data protection to re-enable iPhone Forensics |
2011 |
Andrey Belenko |
|
|
Apple iOS 4 Security Evaluation |
2011 |
Dino A. Dai Zovi |
|
|
Practical Consideration of iOS Device |
2011 |
Jens Heider & Matthias Boll |
|
|
iPhone data protection in depth |
2011 |
Jean-Baptiste Bedrune & Jean Sigwald |
|
|
Exploiting The iOS Kernel |
2011 |
Stefan Esser |
|
|
iOS Kernel Exploitation – IOKIT Edition |
2011 |
Stefan Esser |
|
|
Targeting the iOS kernel |
2011 |
Stefan Esser |
|
|
The Apple Sandbox |
2011 |
Dionysus Blazakis |
|
|
The iOS MDM Protocol |
2011 |
David Schuetz |
|
|
iPhone Exploitation One ROPe to bind them all? |
2011 |
Stefan Esser |
|
|
iOS Forensics: Overcoming iPhone Data Protection |
2011 |
Andrey Belenko |
|
|
Handling iOS encryption in a forensic investigation |
2011 |
Jochem van Kerkwijk |
|
|
IPhone backup files. A penetration tester’s treasure |
2011 |
SANS |
|
|
iPhone Forensics with F/OSS |
2011 |
ViaForensics |
|
|
Evolution of iPhone Baseband and unlocks |
2012 |
MuscleNerd |
|
|
iPhone data protection in depth |
2012 |
Jean-baptiste.bedrune & Jean.sigwald |
|
|
Corona Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
iOS Security |
2012 |
Apple |
|
|
Absinthe Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
Breaking iOS code signing |
2012 |
Charlie Miller |
|
|
Overview on Apple iOS Security |
2012 |
Ahmad Reza Sadeghi |
|
|
iOS 5 – an exploitation night mare |
2012 |
Stefan Esser |
|
|
Jailbreaking Techniques |
2012 |
Pod2g |
|
|
iOS 6 kernel security: A Hacker’s guide |
2012 |
Mark Dowd & |
|
|
Swiping Through Modern Security Features |
2013 |
evad3rs |
|
|
iOS 6 Exploitation 280 days later |
2013 |
stefan esser |
|
| iOS Vulnerabilities Garage Sale |
2013 |
stefan esser |
|
|
Hacking Apple Accessories to pown iDevices |
2013 |
Mathieu Renard |
|
|
Injecting Malware into iOS Devices via Malicious Chargers |
2013 |
Billy Lau & Yeongjin Jang & Chengyu Song |
iOS Hardening
|
Title |
Year |
Author |
Download link |
|
iOS Hardening Configuration Guide |
2012 |
Australian Government |
|
|
Apple iOS Security in the Enterprise |
2012 |
Oliver Karow |
iOS Application Hacking
|
Title |
Year |
Author |
Download link |
|
Penetration testing of iPhone/iPad applications |
2010 |
Kunjan Shah |
|
|
New age application attacks against Apple iOS and countermeasures |
2011 |
Nitesh Dhanjani |
|
|
Hacking and Securing Next Generation iPhone and iPad Apps |
2011 |
Nitesh Dhanjani & Sean Pennline |
|
|
Secure Development on iOS – Advice for developers and penetration testers |
2011 |
David Thiel |
|
|
Pentesting iPhone & iPad Apps |
2011 |
Flora Bottaccio & |
|
|
Detecting Privacy Leaks in iOS Applications |
2011 |
Manuel Egeley, Christopher Kruegel, Engin Kirdaz & |
|
|
Evaluating iOS Applications |
2011 |
Dominic Chell |
|
|
iOS applications reverse engineering |
2011 |
Julien Bachmann |
|
|
Attacking iPhone & iPad Applications |
2011 |
Sebastien Andrivet |
|
|
Pentesting iPhone applications |
2011 |
Satishb3 |
|
|
iOS Application (In)Security |
2012 |
Dominic Chell |
|
|
Auditing iPhone and iPad applications |
2012 |
Ilja van Sprundel |
|
|
iOS SSL kill switch |
2012 |
Justine Osborne & |
|
|
Smart Phones Security |
2012 |
Tomáš Rosa |
|
|
Hacking and securing iOS applications |
2012 |
Satishb3 |
|
|
Attacking iPhone Applications |
2012 |
Chilik Tamir |
|
|
Practical iOS Applications Hacking |
2012 |
Mathieu RENARD |
|
|
Pentesting iOS Apps Runtime Analysis and |
2012 |
Andreas Kurtz |
|
|
Pentesting iOS Applications |
2013 |
Jason Haddix |
|
|
iAnalyzer-No More Blackbox iOS Analysis |
2013 |
Chilik Tamir |
|
|
Protecting Sensitive information on iOS devices |
2013 |
Darth Null |
|
|
How to assess and secure iOS apps |
2013 |
NccGroup |
Best Sites:
1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/
Best Books:
1. Hacking and Securing iOS Applications
2. iOS Hackers hand book
[转]iOS hacking resource collection的更多相关文章
- IOS UIView 03- 自定义 Collection View 布局
注:本人是翻译过来,并且加上本人的一点见解. 前言 UICollectionView 在 iOS6 中第一次被引入,也是 UIKit 视图类中的一颗新星.它和 UITableView 共享一套 API ...
- IOS 从Resource文件夹下Copy文件到沙盒
- (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view. self.t ...
- [RN] 03 - Resource Collection & AWS Auth
那些资源 一.三个例子 iReading Bilibili-React-Native ZhiHuDaily-React-Native 二.IM 例子 1. React Native Socket.io ...
- iOS 添加Resource bundle target(静态库中使用图片等资源)
一.首先将资源文件打包成bundle 新建工程:File -> New -> Project... -> OS X -> Framework & Library -&g ...
- 升级Xcode或 MacOS编译iOS出现resource fork, Finder information, or similar detritus not allowed
很久没有在网上留下足迹了,冒个泡吧 最近升级了Xcode,编译之前的一个项目是出现问题,问题结尾如下: resource fork, Finder information, or similar de ...
- iOS tableview和 Collection复用机制
TableView的重用机制,为了做到显示和数据分离, tableView的实现并且不是为每个数据项创建一个tableCell.而是只创建屏幕可显示最大个数的cell,然后重复使用这些cell,对ce ...
- The Qt Resource System
The Qt Resource System The Qt resource system is a platform-independent mechanism for storing binary ...
- REST Representational state transfer REST Resource Naming Guide Never use CRUD function names in URIs
怎样用通俗的语言解释什么叫 REST,以及什么是 RESTful? - 知乎 https://www.zhihu.com/question/28557115 大家都知道"古代"网 ...
- iOS本地化
本地化与相机中显示英文 工程PROJECT -> info ->Localizations 添加相应的国际化语言 一.当你发现相机中显示英文,可以通过它设置 添加一项“Localize ...
随机推荐
- ASP.NET MVC+EF框架+EasyUI实现权限管理系列(10)- VSS源代码管理
原文:ASP.NET MVC+EF框架+EasyUI实现权限管理系列(10)- VSS源代码管理 ASP.NET MVC+EF框架+EasyUI实现权限管系列 (开篇) (1):框架搭建 ( ...
- javascript系列之DOM(一)
原文:javascript系列之DOM(一) DOM(document object moudle),文档对象模型.它是一个中立于语言的应用程序接口(API),允许程序访问并修改文档的结构,内容和样式 ...
- 【SSH三个框架】Hibernate第七基金会:不少下属业务
相对于上述一关系,在这里,下一个一对多关系说明. 另外,在上述.我们描述了许多人描述的一一对应关系.在关系数据库是多对一的关系,但也有许多关系.但,只知道它是不够的,Hibernate它是一种面向对象 ...
- IE打印的参数配置说明
IE自动给我们在页眉和页脚处加上了这些不必要的打印信息.如果我们不想要任何页眉和页脚的话,直接删除它们就行了.:-)大部分时候我都是这样做的.但如果你想自定义页眉和页脚的时候,该怎么做呢?上面的那些“ ...
- HDU 4303 Hourai Jeweled 树dp 所有权利和航点 dfs2次要
意甲冠军: long long ans = 0; for(int i = 1; i <= n; i++) for(int j = i+1; j <= n; j++) ans += F(i, ...
- oracle_常用命令(表空间查询)
---查询表空间 对应的物理文件,名称 ,大小 ,已用的,利用率 SELECT B.FILE_NAME "FILE_NAME", B.TABLESPACE_NAME "T ...
- Mediator - 中介者模式
定义 用一个中介对象来封装一系列的对象的交互.中介者使各对象不须要显示地相互使用,从而使其耦合松散,并且能够独立的改变他们之间的交互. 案例 比方有一个图像界面,在界面上有一个输入框LineEdit, ...
- .net mvc mssql easyui treegrid
效果图 数据图 可以看到 这里是根据 MenuNo 来 分级别的,支持 无限极,第一级是 01 ,第二级就是 01XX ,第三级 就是 01XXOO.类似 id.pid ,Ztree 里面 也是这 ...
- JS中Array数组的三大属性用法
原文:JS中Array数组的三大属性用法 Array数组主要有3大属性,它们分别是length属性.prototype属性和constructor属性. JS操作Array数组的方法及属性 本文总结了 ...
- MVC生成CheckBoxList并对其验证
原文:MVC生成CheckBoxList并对其验证 通过扩展方法,可以让CheckBox水平排列,生成CheckBoxList,正如"MVC扩展生成CheckBoxList并水平排列&quo ...