During this training, participants will discover the ecosystem and the fundamental bricks of the iOS operating system. They will discover the macOS toolchain used to deploy applications, and the debugging and diagnostic tools.
Participants will be teached fundamentals to reverse-engineer applications and system services: Objective-C internals, IPC mechanisms (XPC, NSXPC) and kernel APIs.
Practical examples and exercices will guide them all along the training. Hardware and software security measures unique to iOS will be covered, from both userland and kernel perspectives.
Synacktiv
@v1csec
Victor Cutillas is a computer security researcher working at Synacktiv.
His main interests are reverse engineering and exploit development with a focus on iOS and Linux.
Almond-based food recipes also make him happy.
Introduction to reverse engineering on Apple platforms:
Mach mechanisms:
Reverse engineering Mach services:
XNU security:
iOS for Security Engineers is an intermediate level course, designed for security engineers wishing to perform research on this system :
Good knowledge of C development and basic knowledge in reverse engineering are recommended. IDA Pro with the Hex-Rays ARM decompiler is nice to have.
Vectorize (Nitay Artenstein & Iddo Eldor & Jacob Bech)