Cover Image for null Bangalore Humla: iOS Pentesting Workshop
Cover Image for null Bangalore Humla: iOS Pentesting Workshop

null Bangalore Humla: iOS Pentesting Workshop

Hosted by Null Bangalore
Registration
Past Event
Welcome! To join the event, please register below.
About Event

iOS Application Penetration Testing Guide

Pre-requisites

iOS Application & Pentesting Background

  • iOS Architecture Overview

  • Understanding Jailbreak & Its Types

  • Rootless vs. RootFul Jailbreaks

  • Jailbreaking an iDevice (Multiple Methods)

    • Unc0ver, Palera1n (Rootful & Rootless), Dopamine, Dopamine RootHide, Bootstrap RootHide etc.

  • Don't Get Jailbroken by a Jailbreak: Spot the Fakes!

  • Physical Device vs. Corellium for Testing

  • IPA File Structure Breakdown (Swift, Cordova, Flutter & XAMARIN)

  • Installing iOS Applications on Jailbroken & Non-Jailbroken Devices (Various Methods)

  • iOS Application Sandbox Structure

  • Necessary Tools Installation

  • Extracting & Dumping Decrypted IPA Files (Multiple Methods)

  • Static Analysis of Applications (Manual & Automated Approaches)

Exploring Some Basic Vulnerabilities

  • Testing Local Storage Security (Filza & Objection)

  • Assessing Application Binary Protection

  • Dumping & Analyzing Sensitive Data in Keychain

  • Performing Memory Dumps

Advanced Testing Techniques & Vulnerabilities

  • Bypassing Advanced Jailbreak Detection Using (Swift, Cordova, Flutter & XAMARIN):

    • 14+ Tweaks

    • Frida & Custom Script Creation

    • Objection

    • Custom Hooking

  • Traffic Interception & Certificate Pinning

    • Intercepting iOS application traffic

    • Understanding Certificate Pinning

    • Bypassing Certificate Pinning Using:

    • Tweaks

    • Frida

    • Objection

    • Intercepting Traffic from Flutter Applications

    • Bypassing Certificate Pinning on Flutter Apps (Multiple Methods)

    • Bypassing Certificate Pinning on XAMARIN Apps

    • Capturing HTTP/HTTPS Traffic Without Bypassing Certificate Pinning

  • Application Reversing & Exploitation

    • Reversing iOS application (Swift, Cordova, Flutter & XAMARIN)

    • DeepLink Exploitation: (Multiple Vulnerabilities)

Pentesting on Non-Jailbroken iDevices

  • Evaluating Local Storage Security Risks on Non-Jailbroken iOS Devices

  • Exploring Frida & Objection on Non-Jailbroken Devices:

    • By Patching the Application

    • Without Patching the Application

Location
To be announced