[转]iOS hacking resource collection
Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/
A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
Title |
Year |
Author |
Download link |
Fuzzing the Phone in your Phone |
2009 |
Charlie Miller & |
Paper |
iPhone security model & vulnerabilities |
2010 |
Cedric Halbronn & |
|
iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility |
2010 |
Mona Bader & Ibrahim Baggili |
Paper |
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 |
2011 |
Andrey Belenko & Dmitry Sklyarov |
Slides |
iPhone Forensics on iOS 5 |
2011 |
Satishb3 |
Paper, Video |
Forensic Analysis of iOS Backups |
2011 |
Satishb3 |
Paper, Video |
Overcoming iOS data protection to re-enable iPhone Forensics |
2011 |
Andrey Belenko |
|
Apple iOS 4 Security Evaluation |
2011 |
Dino A. Dai Zovi |
|
Practical Consideration of iOS Device |
2011 |
Jens Heider & Matthias Boll |
|
iPhone data protection in depth |
2011 |
Jean-Baptiste Bedrune & Jean Sigwald |
|
Exploiting The iOS Kernel |
2011 |
Stefan Esser |
|
iOS Kernel Exploitation – IOKIT Edition |
2011 |
Stefan Esser |
|
Targeting the iOS kernel |
2011 |
Stefan Esser |
|
The Apple Sandbox |
2011 |
Dionysus Blazakis |
|
The iOS MDM Protocol |
2011 |
David Schuetz |
|
iPhone Exploitation One ROPe to bind them all? |
2011 |
Stefan Esser |
|
iOS Forensics: Overcoming iPhone Data Protection |
2011 |
Andrey Belenko |
|
Handling iOS encryption in a forensic investigation |
2011 |
Jochem van Kerkwijk |
|
IPhone backup files. A penetration tester’s treasure |
2011 |
SANS |
|
iPhone Forensics with F/OSS |
2011 |
ViaForensics |
|
Evolution of iPhone Baseband and unlocks |
2012 |
MuscleNerd |
|
iPhone data protection in depth |
2012 |
Jean-baptiste.bedrune & Jean.sigwald |
|
Corona Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
iOS Security |
2012 |
Apple |
|
Absinthe Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
Breaking iOS code signing |
2012 |
Charlie Miller |
|
Overview on Apple iOS Security |
2012 |
Ahmad Reza Sadeghi |
|
iOS 5 – an exploitation night mare |
2012 |
Stefan Esser |
|
Jailbreaking Techniques |
2012 |
Pod2g |
|
iOS 6 kernel security: A Hacker’s guide |
2012 |
Mark Dowd & |
|
Swiping Through Modern Security Features |
2013 |
evad3rs |
|
iOS 6 Exploitation 280 days later |
2013 |
stefan esser |
|
iOS Vulnerabilities Garage Sale |
2013 |
stefan esser |
|
Hacking Apple Accessories to pown iDevices |
2013 |
Mathieu Renard |
|
Injecting Malware into iOS Devices via Malicious Chargers |
2013 |
Billy Lau & Yeongjin Jang & Chengyu Song |
iOS Hardening
Title |
Year |
Author |
Download link |
iOS Hardening Configuration Guide |
2012 |
Australian Government |
|
Apple iOS Security in the Enterprise |
2012 |
Oliver Karow |
iOS Application Hacking
Title |
Year |
Author |
Download link |
Penetration testing of iPhone/iPad applications |
2010 |
Kunjan Shah |
|
New age application attacks against Apple iOS and countermeasures |
2011 |
Nitesh Dhanjani |
|
Hacking and Securing Next Generation iPhone and iPad Apps |
2011 |
Nitesh Dhanjani & Sean Pennline |
|
Secure Development on iOS – Advice for developers and penetration testers |
2011 |
David Thiel |
|
Pentesting iPhone & iPad Apps |
2011 |
Flora Bottaccio & |
|
Detecting Privacy Leaks in iOS Applications |
2011 |
Manuel Egeley, Christopher Kruegel, Engin Kirdaz & |
|
Evaluating iOS Applications |
2011 |
Dominic Chell |
|
iOS applications reverse engineering |
2011 |
Julien Bachmann |
|
Attacking iPhone & iPad Applications |
2011 |
Sebastien Andrivet |
|
Pentesting iPhone applications |
2011 |
Satishb3 |
|
iOS Application (In)Security |
2012 |
Dominic Chell |
|
Auditing iPhone and iPad applications |
2012 |
Ilja van Sprundel |
|
iOS SSL kill switch |
2012 |
Justine Osborne & |
|
Smart Phones Security |
2012 |
Tomáš Rosa |
|
Hacking and securing iOS applications |
2012 |
Satishb3 |
|
Attacking iPhone Applications |
2012 |
Chilik Tamir |
|
Practical iOS Applications Hacking |
2012 |
Mathieu RENARD |
|
Pentesting iOS Apps Runtime Analysis and |
2012 |
Andreas Kurtz |
|
Pentesting iOS Applications |
2013 |
Jason Haddix |
|
iAnalyzer-No More Blackbox iOS Analysis |
2013 |
Chilik Tamir |
|
Protecting Sensitive information on iOS devices |
2013 |
Darth Null |
|
How to assess and secure iOS apps |
2013 |
NccGroup |
Best Sites:
1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/
Best Books:
1. Hacking and Securing iOS Applications
2. iOS Hackers hand book
[转]iOS hacking resource collection的更多相关文章
- IOS UIView 03- 自定义 Collection View 布局
注:本人是翻译过来,并且加上本人的一点见解. 前言 UICollectionView 在 iOS6 中第一次被引入,也是 UIKit 视图类中的一颗新星.它和 UITableView 共享一套 API ...
- IOS 从Resource文件夹下Copy文件到沙盒
- (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view. self.t ...
- [RN] 03 - Resource Collection & AWS Auth
那些资源 一.三个例子 iReading Bilibili-React-Native ZhiHuDaily-React-Native 二.IM 例子 1. React Native Socket.io ...
- iOS 添加Resource bundle target(静态库中使用图片等资源)
一.首先将资源文件打包成bundle 新建工程:File -> New -> Project... -> OS X -> Framework & Library -&g ...
- 升级Xcode或 MacOS编译iOS出现resource fork, Finder information, or similar detritus not allowed
很久没有在网上留下足迹了,冒个泡吧 最近升级了Xcode,编译之前的一个项目是出现问题,问题结尾如下: resource fork, Finder information, or similar de ...
- iOS tableview和 Collection复用机制
TableView的重用机制,为了做到显示和数据分离, tableView的实现并且不是为每个数据项创建一个tableCell.而是只创建屏幕可显示最大个数的cell,然后重复使用这些cell,对ce ...
- The Qt Resource System
The Qt Resource System The Qt resource system is a platform-independent mechanism for storing binary ...
- REST Representational state transfer REST Resource Naming Guide Never use CRUD function names in URIs
怎样用通俗的语言解释什么叫 REST,以及什么是 RESTful? - 知乎 https://www.zhihu.com/question/28557115 大家都知道"古代"网 ...
- iOS本地化
本地化与相机中显示英文 工程PROJECT -> info ->Localizations 添加相应的国际化语言 一.当你发现相机中显示英文,可以通过它设置 添加一项“Localize ...
随机推荐
- hdu4324 Triangle LOVE (拓扑排序)
这是一道最简单的拓扑排序题,好久没看这个算法了! 有点生疏了! 后附上百度的资料; #include<stdio.h> #include<string.h> int in[50 ...
- Java有用的经验--Swing片
Java有用经验总结--Swing篇 前言 本文前言部分为我的一些感想,假设你仅仅对本文介绍的Java有用技巧感兴趣,能够跳过前言直接看正文的内容. 本文的写作动机来源于近期接给人家帮忙写的一个小程序 ...
- [LeetCode] 033. Search in Rotated Sorted Array (Hard) (C++)
指数:[LeetCode] Leetcode 解决问题的指数 (C++/Java/Python/Sql) Github: https://github.com/illuz/leetcode 033. ...
- DYNAMICRESOLUTION | NODYNAMICRESOLUTION
有时候开启OGG进程的时候较慢,可能是由于须要同步的表太多,OGG在开启进程之前会将须要同步的表建立一个记录而且存入到磁盘中,这样就须要耗费大量的时间.OGG同一时候也提供了DYNAMICRESOLU ...
- javascript实现数据结构:广义表
原文:javascript实现数据结构:广义表 广义表是线性表的推广.广泛用于人工智能的表处理语言Lisp,把广义表作为基本的数据结构. 广义表一般记作: LS = (a1, a2, ..., an ...
- obj-c编程15[Cocoa实例03]:MVC以及归档化演示样例
前面的博文里介绍了归档和解档,这里我们把它实际应用到一个简单的代码中去,将它作为一个多文档应用程序的打开和保存的背后支持.另外这里介绍一下MVC思想,这个在不论什么语言里都会有,它是一种设计思想,主要 ...
- Roundabout for jQuery
效果图: Roundabout是一个转换静态HTML元素结构为交互式播放区域的jQuery插件(而且并不仅仅是一个转盘,还有许多的形状) 首先你要下载好Jquery.min.js,和Jquery-Ro ...
- Yii Framework2.0开发教程(10)配合mysql数据库实现用户登录
1.首先在mysql创建一个存用户的表格 create table test_user ( user_id bigint(20) unsigned not null auto_increment co ...
- SSAS系列——【02】多维数据(维度对象)
原文:SSAS系列——[02]多维数据(维度对象) 1.维度是什么? 数学中叫参数,物理学中是独立的时空坐标的数目.0维是一点,1维是线,2维是一个长和宽(或曲线)面积,3维是2维加上高度形成体积面. ...
- 通过扩展改善ASP.NET MVC的验证机制[使用篇]
原文:通过扩展改善ASP.NET MVC的验证机制[使用篇] ASP.NET MVC提供一种基于元数据的验证方式是我们可以将相应的验证特性应用到作为Model实体的类型或者属性/字段上,但是这依然具有 ...