Saturday, November 3, 2012

Pentest & Reverse: iOS Application Hacking


iOS Appllication hacking

Last month I gave some lecure about iOS application Hacking first at GreHack (Grenoble, France) and then at Hack.Lu (Luxembourg, Luxembourg). Here you will find a quick summary of the talk and the slides and paper. Don't hesitate to send me your question.

Summary

This talk demonstrates how professional applications like, Mobile Device Management (MDM) Client, Confidential contents manager (Sandbox), professional media players and other applications handling sensitive data are attacked and sometimes easily breached. This talk is designed to demonstrate many of the techniques attackers use to manipulate iOS applications in order to extract confidential data from the device. In this talk, the audience will see examples of the worst practices we are dealing with every day when pentesting iOS applications and learn how to mitigate the risks and avoid common mistakes that leave applications exposed. Attendees will gain a basic understanding of how these attacks are executed, and many examples and demonstrations of how to code more securely in ways that won't leave applications exposed to such attacks. 




[Paper | Slides]








10 comments:

  1. Hi DarK!

    Thank you for sharing your slides and paper.

    It is a very interestin and ambitious paper, with a lot of stuff inside. Each topic could be an entire paper!

    I really like the work you did on jailbreak detection bypass. You are the first who gives a so complete information on that topic. About that I was wondering: API hooking is a great solution to trick the JB detection, but it requires a lot of reverse engineering and if the app uses many different routines you will have a lot of work to do. DO you know if it's possible to chroot apps on IOS? I mean, the JB detection is based on priviledged actions, such as restricted file acces or restricted binary launch. If you can chroot the app, it will never be able to perform such actions and think it is on a standard system. And once the app is chrooted, any JB detection routine will fail!

    Btw I saw your Grehack talk, and I was really impressed by your malicious radio alarm dock! Will you post on that soon?

    Great job, man!

    ReplyDelete
  2. I use a tracking app from MxSpy http://mxspy.com/how-to-hack-a-phone/ to hack a phone. I don't try to track group chats, but I think it should work.

    ReplyDelete
  3. They will additionally incorporate the refreshed data in the Maps App persistently to give more important and refreshed data to clients. click to read more

    ReplyDelete
  4. Either way they changed the way the game was played. Now cheats are more interactive and are considered more like bonuses than actual cheats jailbreak roblox hack

    ReplyDelete
  5. It's simple! No download or install required. All you have to do is to simply input victim's profile URL address and click "Hack Account" Blue Portal..

    ReplyDelete
  6. Each word created has enchanted its gathering of spectators in the most exceptional way.
    paypal money hack

    ReplyDelete
  7. Hacking is a practice of modification of a computer hardware and software system. Illegal breaking of a computer system is a criminal offence. Recently a spurt in hacking of computer systems has opened up several courses on ethical hacking.Kali Linux Tutorials

    ReplyDelete
  8. This comment has been removed by the author.

    ReplyDelete
  9. When searching for an internet site . that gives best games, take note on the following signs.Unblocked Slope

    ReplyDelete
  10. That is really nice to hear. thank you for the update and good luck. download cydia impactor latest

    ReplyDelete