Autoplay
Autocomplete
Previous Lesson
Complete and Continue
iOS Application Security
Introduction to the Course
Intro To Course (Enhanced Edition) (3:16)
Downloads
Downloads: Training Presentation, Training App
Understanding iOS & Getting Started
Understanding iOS & Exploring Filesystem Using SSH (7:20)
iOS Security Controls, Sandboxing & Basics of Jailbreaking (12:21)
Setting Up iOS Pentesting Environment In 2025 (5:40)
Understanding How Apps Are Built & Side-loading Restrictions (16:25)
Understanding Runtime Instrumentation (6:06)
Penetration Testing iOS Applications
The Idea Of A Pentest - Approach, OWASP Mobile Top 10 (15:08)
Extracting Unencrypted IPA From Device (10:50)
Installing Unsigned IPA On Device (10:45)
Reverse Engineering iOS Apps (Unpacking IPA, Strings, MobSF) (12:26)
Reverse Engineering iOS Apps (Hopper Disassembler, Ghidra) (14:16)
Reverse Engineering iOS Apps (Dynamic Analysis - Frida & Objection) (13:17)
iOS Local Data Storage & Finding Vulnerabilities Using Objection (23:46)
Traffic Interception & Certificate Pinning Bypass (18:37)
Exploring API Security Testing (2:36)
IPC in iOS Apps (URL Schemes & Exploiting Deeplinks) (14:20)
Exploring Objection (12:40)
Frida Codeshare & Using Own Script (6:54)
Conclusion (2:18)
Understanding Runtime Instrumentation
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock