Analyzing iOS Apps - Road from AppStore to Security Analysis Report
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore a comprehensive toolset for detecting vulnerabilities in binary iOS applications in this conference talk from Recon 2017 Brussels. Learn about a four-step analysis workflow that includes downloading and decrypting iOS apps from the App Store, decompiling applications using LLVM as the intermediate representation language, performing static analysis to identify common vulnerabilities, and generating human-readable pseudocode. Discover how the toolset handles Objective-C and Swift applications, reconstructs program semantics, and utilizes runtime type information. See real-world examples of common security flaws and how they can be identified using this advanced analysis engine.
Syllabus
Recon 2017 Brussels - Analyzing iOS apps: road from AppStore to security analysis report
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube