[转]iOS hacking resource collection
Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/
A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
|
Title |
Year |
Author |
Download link |
|
Fuzzing the Phone in your Phone |
2009 |
Charlie Miller & |
Paper |
|
iPhone security model & vulnerabilities |
2010 |
Cedric Halbronn & |
|
|
iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility |
2010 |
Mona Bader & Ibrahim Baggili |
Paper |
|
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 |
2011 |
Andrey Belenko & Dmitry Sklyarov |
Slides |
|
iPhone Forensics on iOS 5 |
2011 |
Satishb3 |
Paper, Video |
|
Forensic Analysis of iOS Backups |
2011 |
Satishb3 |
Paper, Video |
|
Overcoming iOS data protection to re-enable iPhone Forensics |
2011 |
Andrey Belenko |
|
|
Apple iOS 4 Security Evaluation |
2011 |
Dino A. Dai Zovi |
|
|
Practical Consideration of iOS Device |
2011 |
Jens Heider & Matthias Boll |
|
|
iPhone data protection in depth |
2011 |
Jean-Baptiste Bedrune & Jean Sigwald |
|
|
Exploiting The iOS Kernel |
2011 |
Stefan Esser |
|
|
iOS Kernel Exploitation – IOKIT Edition |
2011 |
Stefan Esser |
|
|
Targeting the iOS kernel |
2011 |
Stefan Esser |
|
|
The Apple Sandbox |
2011 |
Dionysus Blazakis |
|
|
The iOS MDM Protocol |
2011 |
David Schuetz |
|
|
iPhone Exploitation One ROPe to bind them all? |
2011 |
Stefan Esser |
|
|
iOS Forensics: Overcoming iPhone Data Protection |
2011 |
Andrey Belenko |
|
|
Handling iOS encryption in a forensic investigation |
2011 |
Jochem van Kerkwijk |
|
|
IPhone backup files. A penetration tester’s treasure |
2011 |
SANS |
|
|
iPhone Forensics with F/OSS |
2011 |
ViaForensics |
|
|
Evolution of iPhone Baseband and unlocks |
2012 |
MuscleNerd |
|
|
iPhone data protection in depth |
2012 |
Jean-baptiste.bedrune & Jean.sigwald |
|
|
Corona Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
iOS Security |
2012 |
Apple |
|
|
Absinthe Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
|
Breaking iOS code signing |
2012 |
Charlie Miller |
|
|
Overview on Apple iOS Security |
2012 |
Ahmad Reza Sadeghi |
|
|
iOS 5 – an exploitation night mare |
2012 |
Stefan Esser |
|
|
Jailbreaking Techniques |
2012 |
Pod2g |
|
|
iOS 6 kernel security: A Hacker’s guide |
2012 |
Mark Dowd & |
|
|
Swiping Through Modern Security Features |
2013 |
evad3rs |
|
|
iOS 6 Exploitation 280 days later |
2013 |
stefan esser |
|
| iOS Vulnerabilities Garage Sale |
2013 |
stefan esser |
|
|
Hacking Apple Accessories to pown iDevices |
2013 |
Mathieu Renard |
|
|
Injecting Malware into iOS Devices via Malicious Chargers |
2013 |
Billy Lau & Yeongjin Jang & Chengyu Song |
iOS Hardening
|
Title |
Year |
Author |
Download link |
|
iOS Hardening Configuration Guide |
2012 |
Australian Government |
|
|
Apple iOS Security in the Enterprise |
2012 |
Oliver Karow |
iOS Application Hacking
|
Title |
Year |
Author |
Download link |
|
Penetration testing of iPhone/iPad applications |
2010 |
Kunjan Shah |
|
|
New age application attacks against Apple iOS and countermeasures |
2011 |
Nitesh Dhanjani |
|
|
Hacking and Securing Next Generation iPhone and iPad Apps |
2011 |
Nitesh Dhanjani & Sean Pennline |
|
|
Secure Development on iOS – Advice for developers and penetration testers |
2011 |
David Thiel |
|
|
Pentesting iPhone & iPad Apps |
2011 |
Flora Bottaccio & |
|
|
Detecting Privacy Leaks in iOS Applications |
2011 |
Manuel Egeley, Christopher Kruegel, Engin Kirdaz & |
|
|
Evaluating iOS Applications |
2011 |
Dominic Chell |
|
|
iOS applications reverse engineering |
2011 |
Julien Bachmann |
|
|
Attacking iPhone & iPad Applications |
2011 |
Sebastien Andrivet |
|
|
Pentesting iPhone applications |
2011 |
Satishb3 |
|
|
iOS Application (In)Security |
2012 |
Dominic Chell |
|
|
Auditing iPhone and iPad applications |
2012 |
Ilja van Sprundel |
|
|
iOS SSL kill switch |
2012 |
Justine Osborne & |
|
|
Smart Phones Security |
2012 |
Tomáš Rosa |
|
|
Hacking and securing iOS applications |
2012 |
Satishb3 |
|
|
Attacking iPhone Applications |
2012 |
Chilik Tamir |
|
|
Practical iOS Applications Hacking |
2012 |
Mathieu RENARD |
|
|
Pentesting iOS Apps Runtime Analysis and |
2012 |
Andreas Kurtz |
|
|
Pentesting iOS Applications |
2013 |
Jason Haddix |
|
|
iAnalyzer-No More Blackbox iOS Analysis |
2013 |
Chilik Tamir |
|
|
Protecting Sensitive information on iOS devices |
2013 |
Darth Null |
|
|
How to assess and secure iOS apps |
2013 |
NccGroup |
Best Sites:
1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/
Best Books:
1. Hacking and Securing iOS Applications
2. iOS Hackers hand book
[转]iOS hacking resource collection的更多相关文章
- IOS UIView 03- 自定义 Collection View 布局
注:本人是翻译过来,并且加上本人的一点见解. 前言 UICollectionView 在 iOS6 中第一次被引入,也是 UIKit 视图类中的一颗新星.它和 UITableView 共享一套 API ...
- IOS 从Resource文件夹下Copy文件到沙盒
- (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view. self.t ...
- [RN] 03 - Resource Collection & AWS Auth
那些资源 一.三个例子 iReading Bilibili-React-Native ZhiHuDaily-React-Native 二.IM 例子 1. React Native Socket.io ...
- iOS 添加Resource bundle target(静态库中使用图片等资源)
一.首先将资源文件打包成bundle 新建工程:File -> New -> Project... -> OS X -> Framework & Library -&g ...
- 升级Xcode或 MacOS编译iOS出现resource fork, Finder information, or similar detritus not allowed
很久没有在网上留下足迹了,冒个泡吧 最近升级了Xcode,编译之前的一个项目是出现问题,问题结尾如下: resource fork, Finder information, or similar de ...
- iOS tableview和 Collection复用机制
TableView的重用机制,为了做到显示和数据分离, tableView的实现并且不是为每个数据项创建一个tableCell.而是只创建屏幕可显示最大个数的cell,然后重复使用这些cell,对ce ...
- The Qt Resource System
The Qt Resource System The Qt resource system is a platform-independent mechanism for storing binary ...
- REST Representational state transfer REST Resource Naming Guide Never use CRUD function names in URIs
怎样用通俗的语言解释什么叫 REST,以及什么是 RESTful? - 知乎 https://www.zhihu.com/question/28557115 大家都知道"古代"网 ...
- iOS本地化
本地化与相机中显示英文 工程PROJECT -> info ->Localizations 添加相应的国际化语言 一.当你发现相机中显示英文,可以通过它设置 添加一项“Localize ...
随机推荐
- Skype发布视频API
原文:Skype发布视频API 相信很多人对Skype多少都应该有一些了解,如果以前没有使用过它的服务的话,也应该在最近的新闻中听说过它的大名.因为,它和我们每天都在接触的公司--Mircrosoft ...
- 【百度地图API】如何获取行政区域的边界?
原文:[百度地图API]如何获取行政区域的边界? 摘要:以前教过大家如何自行获取行政区域,或者自定义获取一个区域的边界值.今天来教大家直接调用百度地图API1.3(目前最新版本)来获取行政区域的边界值 ...
- easyui dataBox 增加一天,减少一天
<table> <tr> <td><a href="javascript:void(0)" class="easyui-link ...
- HDU 4052 Adding New Machine(矩形面积并)
Adding New Machine Problem Description Incredible Crazily Progressing Company (ICPC) suffered a lot ...
- Facebook HHVM 和 Hack 手册----1.什么是Hack?
什么是Hack? Hack 是一种基于HHVM(HipHop VM 是Facebook推出的用来执行PHP代码的虚拟机,它是一个PHP的JIT编译器,同时具有产生快速代码和即时编译的优点)的新型编程语 ...
- Oracle在rownum使用结果集排序
Oracle在rownum使用结果集排序 对于 Oracle 的 rownum 问题,非常多资料都说不支持>,>=,=,between...and,仅仅能用以上符号(<.< ...
- VirtualBox更改虚拟机磁盘VDI的大小
流程虚拟机中使用,有时会遇到磁盘大小是不够的,假设一套"动态分配的内存".通过下面的方法来手动扩展磁盘空间. 1.启动CMD命令行.进入VirtualBox安装文件夹.例如 cd ...
- ASP.NET如何显示农历时间
ASP.NET如何显示农历时间 CS部分代码如下: 代码如下: public string ChineseTimeNow = ""; public string ForignTi ...
- linuxsocket通信recv研究缓存机制
曾有过这样一个小疑问.当一个进程注册的插座后,,假设插座没有被调用recv函数接受包.能接受到数据包吗? 或者这样说,假设我的程序注冊了一个套接字去接受数据包,可是每收到一个数据包都须要非常长 ...
- Gimp插件Hello world注释
前一阵翻译gimp官网的编写插件教程,本打算继续翻译第二部分,但是感觉第一个例子还不是很懂,翻译第二部分有点理解不能,所以就读了一下源码,记录如下 #include <libgimp/gimp. ...