iOS reverse and security

Applicable people:
iOS developers, jailbreak enthusiasts, security researchers

Course Overview Seeing the cool features of a certain application, want to learn from it, but can't get started? Want to enter the pit to escape development, but find it difficult? Encountered all kinds of tools reporting errors but still at a loss? Distressed because the app was cracked?

We sincerely invite the authors of "iOS Application Reverse Engineering" to create it together. This course is based on practical principles, starting with the knowledge needed to develop reverse engineering from jailbreak, and through learning theoretical knowledge, tool principles and practical demonstrations, allowing you to peel away the inside of the application step by step Principle and structure.

The core content of the course includes: jailbreak environment preparation, OC language features, Mach-O file format, ARM assembly, App signature, tool usage principle, practical demonstration, security protection, etc.
After completing this course, you can:

  1. Deep understanding of iOS system, language features and file structure
  2. Master the use and principles of various reverse tools
  3. Master various analysis skills and analysis methods
  4. Learn how to fight reverse analysis and protect applications

Q: According to the catalog, I think I can do it. Do I still need to buy it?
A: Although it seems that they are some common knowledge points from the table of contents, Siege Lions, each knowledge is explained in depth. The principles of tool usage and file structure are all in-depth articles, such as class_dump versus __objc_classlist Analysis. Later, there are three practical explanations of analysis skills, analysis ideas, and the use of Xcode to debug other apps and injected dynamic libraries, and use Frida to build your own reverse analysis artifact. Finally, there are knowledge points about encryption, obfuscation, anti-debugging, and anti-anti-debugging protection.

Table of Contents
Chapter 1: Initial Reverse Engineering
Class 1 Video First Understanding Reverse Engineering 15:03
Class Hours 2 Video iOS System Security Mechanism 11:36
Class Hours 3 Video Understanding Jailbreak Equipment 18:53
Class Hours 4 Video Jailbreak Environment Configuration 19:02
Class Hours 5 Text First Chapter Document Summary
Chapter 2: Theoretical basis is "internal work"
Class hours 6 Video App structure and construction process 12:33
Class hours 7 Video to find the code behind the control 26: 21 Class
hours 8 Video data storage
16: 09 Class hours 9 Video classes and methods 28: 58
Class Hours 10 Video Runtime Features 17:36
Class Hours 11 Video Understanding Hook 16: 56
Class Hours 12 Video Hook Principle 22:05
Class Hours 13 Video ARM Assembly (Part 1) 21:07
Class Hours 14 Video ARM Assembly (Part 2) 21:18
Class Hours 15 Video Mach -O file format (top) 24:15
class hour 16 video Mach-O file format (bottom) 25:05
class hour 17 video App signature 19:18
class hour 18 video dynamic library 27:58
class hour 19 text Chapter 2 Document Summary
Chapter 3 : Reverse analysis of "the weapon of magic weapon"
class 20 video application smashing shell 18:48
class 21 video class-dump 24: 15
class 22 video Reveal 16: 25
class 23 video Cycript 19: 50
class 24 video network capture 22: 36
class 25 video static Analysis 25:12
Lesson 26 Video Dynamic Debugging 33: 23 Lesson
Hours 27 Video theos ( Part 1) 21: 23 Lesson Hours
28 Video theos (Part 2) 15: 56 Lesson
Hours 29 Text Chapter 3 Document Summary
Chapter 4: Find Fun in Practice
Lesson 30 Video Remove OPlayer Lite
Ads (Part 1 ) 18:45 Class Hours 31 Video Removal of OPlayer Lite Ads (Part 2) 23:30
Class Hours 32 Video Analysis WhatsApp Chat (Top) 22: 31
Class Hours 33 Video Analysis WhatsApp Chat (Part 2) 15:03
Class Hours 34 Video Snapchat Messaging (top) 29:00
class hour 35 video Snapchat messaging (bottom) 22:07
class hour 36 video migration to non-jailbreak machines 30:10
class hour 37 video Frida's application in reverse (top) 15:15
class hour 38 video Frida Application in reverse engineering (middle) 18:53
class hours 39 video Frida application in reverse engineering (below) 17:29
chapter 5: build your own shield
class hours 40 video code protection basics 08:33
class hours 41 video data encryption 27:52
Class hours 42 Video anti-debugging and anti
-injection (Part 1 ) 23:41 Class hours 43 Video anti-debugging and anti-injection (Part 2) 26:10
Class hours 44 Video code confusion ( Part 1) 14: 43
Class hours 45 Video code confusion (Part 2) 18:36

Guess you like

Origin blog.51cto.com/15068182/2574743