During this training, participants will discover the ecosystem and the fundamental bricks of the iOS operating system. They will discover the macOS toolchain used to deploy applications, and the debugging and diagnostic tools.
Participants will be teached fundamentals to reverse-engineer applications and system services: Objective-C internals, IPC mechanisms (XPC, NSXPC) and kernel APIs.
Practical examples and exercices will guide them all along the training. Hardware and software security measures unique to iOS will be covered, from both userland and kernel perspectives.
Victor Cutillas is a computer security researcher working at Synacktiv.
His main interests are reverse engineering and exploit development with a focus on iOS and Linux.
Almond-based food recipes also make him happy.
Introduction to reverse engineering on Apple platforms:
Reverse engineering Mach services:
iOS for Security Engineers is an intermediate level course, designed for security engineers wishing to perform research on this system :
Good knowledge of C development and basic knowledge in reverse engineering are recommended. IDA Pro with the Hex-Rays ARM decompiler is nice to have.
Vectorize (Nitay Artenstein & Iddo Eldor & Jacob Bech)
Vectorize (Pedro Ribeiro & Seamus Burke)