所有英文文档对应的中文地址:
- http://wufawei.com/2013/11/ios-application-security-1
- http://wufawei.com/2013/11/ios-application-security-..
- http://wufawei.com/2013/11/ios-application-security-38
Part 2 - Getting class information of iOS apps
Part 3 - Understanding the Objective-C Runtime
Part 4 – Runtime Analysis Using Cycript (Yahoo Weather App)
Part 5 – Advanced Runtime analysis and manipulation using Cycript (Yahoo Weather App)
Part 6 - New Security Features in iOS 7
Part 8 - Method Swizzling using Cycript
Part 9 – Analyzing Security of iOS Applications using Snoop-it
Part 10 – iOS Filesystem and Forensics
Part 11 – Analyzing Network Traffic over HTTP/HTTPS
Part 12 – Dumping Keychain Data
http://highaltitudehacks.com/2013/08/20/ios-application-security-part-12-dumping-keychain-data
Part 13 – Booting a custom Ramdisk using Sogeti Data Protection tools
Part 14 – Gathering information using Sogeti Data Protection tools
Part 15 – Static Analysis of iOS Applications using iNalyzer
Part 16 – Runtime Analysis of iOS Applications using iNalyzer
Part 17 – Black-Box Assessment of iOS Applications using INTROSPY
Part 18 – Detecting custom signatures with Introspy
Part 19 – Programmatical Usage of Introspy
Part 20 – Local Data Storage (NSUserDefaults
Part 21 – ARM and GDB Basics
http://highaltitudehacks.com/2013/11/08/ios-application-security-part-21-arm-and-gdb-basics
Part 22 – Runtime Analysis and Manipulation using GDB
Part 23 – Defending against runtime analysis and manipulation
Part 25 – Secure Coding Practices for iOS Development
Part 26 – Patching iOS Applications using IDA Pro and Hex Fiend
Part 27 - Setting up a mobile pentesting environment with iOS 7 Jailbreak
Part 28 - Patching iOS Application with Hopper
Part 29 - Insecure or Broken Cryptography
Part 30 - Attacking URL schemes
http://highaltitudehacks.com/2014/03/07/ios-application-security-part-30-attacking-url-schemes
Part 31 - The problem with using third party libraries for securing your apps
Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
Part 34 - Tracing Method calls using Logify
Part 35 – Auditing iOS Applications With iDB
Part 36 – Bypassing certificate pinning using SSL Kill switch
Part 37 - Adapting to iOS 8
http://highaltitudehacks.com/2014/12/21/ios-application-security-part-37-adapting-to-ios-8
Part 38 - Attacking apps using Parse (Guest Lecture by Egor Tolstoy)
http://highaltitudehacks.com/2015/01/24/ios-application-security-part-38-attacking-apps-using-parse