Notice
Recent Posts
Recent Comments
Link
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
Tags
- application security
- miniconda
- docker
- XCP-ng
- 로그인불가
- elastic stack
- centos 8
- macos
- 보안양파
- hardening
- bash
- ssh key 배포
- Kibana
- Windows
- freebsd
- 한글가이드
- pfsense
- ELASTIC
- G-suite
- endpoint security
- Elasticsearch
- GitLab
- PlayBook
- Kibana server is not ready yet
- x-pack
- ansible
- proxycfg
- xe guest utilities
- Proxy
Archives
- Today
- Total
선 밖에 선 자유인
iOS Security 관련 커리큘럼 본문
http://www.securitytube-training.com/online-courses/securitytube-ios-security-expert/
Module 1: Introduction to iOS Security
- iOS Platform Basics
- iOS Application Development and Testing
- Objective C and iOS Frameworks
- Xcode, iPhone and iPad simulators
- The ARM processor
- MVC basics and a sample iOS application
- Event Driven applications
- iOS Platform Security
- Secure Boot
- Application Code Signing and Appstore restrictions
- Application Sandboxing
- Encryption and Data Security
- Secure Network Access
Module 2: Creating an Application Pentest Platform
- iOS – Platform Constraints and Limitations
- Jailbreaking – Why and How?
- History of Jailbreaking exploits
- Cydia and other 3rd party repositories
- Installing Assessment Tools on your iPhone
- Filesystem analysis
- Runtime analysis
- Debugging and Dis-assembling
- Network Monitoring – proxies, raw traffic dumps
- Sqlite basics
- Plist basics and Plutil
- Class-Dump
Module 3: Advanced Application Runtime Analysis
- Decrypting Applications
- GDB
- Clutch and other tools
- Runtime Analysis with GDB
- GDB basics – breakpoints, conditionals etc.
- Debugging Objective-C and understanding objc_msgSend
- Inspecting Objects in Memory
- Calling Functions and Methods
- Disassembling iOS Applications
- ARM assembly basics
- Registers and function/method calling
- Modifying data and Changing Control
- Runtime Analysis with Cycript
- Cycript Basics
- Using the JS – Objective-C bridge
- Finding Variables and Methods in memory
- Inspecting Variables and Calling Methods
- Replacing Methods at runtime
- Using 3rd party Cycript scripts
Module 4: Exploiting iOS Applications
- Examining Application Data Storage at Runtime
- Plist and XML files
- NSUserDefaults
- Sqlite Data
- Keychain
- Core Data Services
- Temporary files
- Directory Structure and Snapshot Analysis
- Insecure Local Data Storage
- Plist, XML, Sqlite, Temp Files etc.
- Information leakage using log files
- Keychain Data Storage and Security
- Data and File Security
- Improper Encryption
- Breaking Authentication and Authorization
- Insecure Session Management
- Cookies.binarycookies
- Exploiting IPC / URL Schemas
- Insecure Data Caching – keyboard, UI screenshots etc.
- Improper use of UIPasteboard
- Application Fuzzing
- Attacking UIWebViews (XSS)
- Attacking XML Parsing
- Analyzing and attacking HTTP/HTTPS
- Using self-signed certificates with proxies
- Traffic interception and mangling
- Security concerns with NSURLxxxx and CFNetwork
- Security concerns with CFStream and NSStream
- Directory Traversal attacks
- Attacking Server side applications / Web services from the App
- UDID privacy concerns and faking
- Security concerns due to the C platform
- Buffer overflows and memory corruption
- Poison NULL byte attacks
- Format string vulnerabilities
- Understanding Anti-Piracy techniques
- Plist, Bundled items, Signer Identity etc. checks
- Anti-Debugging techniques
- File integrity / Hash etc. checks
- Anti Anti-Piracy techniques
- Beating checks
- Replacing check functions / methods
- Mobile Substrate
- Basics of Runtime Patching
- Using Mobile Substrate
- Hooking with MobileHooking
- MSHookMessage
- MSHookMessageEx
- MSHookFunction
- MobileLoader
- Hooking with MobileHooking
- Code Injection with DYLD_INSERT_LIBRARIES
- API Monitoring
- Solving Application Challenges
Module 5: iOS Forensics and Data Recovery
- Filesystem Organization in iOS
- Understanding Disk and File Encrption
- Forensics on non-Jailbroken devices
- PIN brute-forcing on the device
- Forensics on Jailbroken devices
- Recovering and Analyzing Data
- Plist, Keychain
- Address book, Maps, Call History, SMS, Photos etc.
- Safari, Chrome caches, saved data
- iTune backups basics
- File and Data recovery
Module 6: iOS Malware and Backdoors
- History of iOS Malware
- Background tasks, Daemons and launchd
- Backdoors, Malware examples
- Bind and Reverse Connect Shells on iOS
- Interacting with the shells via Metasploit
Module 7: Further Study and Roadmap
- Course consolidation
- Interesting project ideas to pursue
Module 8: Exam Pattern and Mock Exam
- Exam format
- Mock Exam
------------------
http://www.pentesteracademy.com/course?id=2
Comments