
iPhone and iPad Security & Exploitation |
|
Outline
1 PRODUCTS
1.1 IPHONE
1.2 IPHONE VERSIONS
1.3 IPAD
1.4 IPAD VERSIONS
1.5 FIRMWARE
1.6 IOS
1.7 ICLOUD
2 INTRO TO THE MAC
2.1 ITUNES PREFERENCES
3 VOICEOVER ACCESSIBILITY
4 JAILBREAKING 21
4.1 EXCLUSIVE CHIP IDENTIFICATION NUMBER
4.2 TETHERED VERSUS UNTETHERED JAILBREAKING
5 JAILBROKEN APPS
5.1 INSTALL CYDIA AND OPENSSH
5.2 MANAGING 3RD PARTY APPS
6 IPHONE FILESYSTEM ACCESS AND STRUCTURE
6.1 IPHONE FILE SYSTEM ACCESS
6.2 SQLITE MANAGER
7 DATA PROTECTION
8 PLIST FILES
8.1 AUTO LAUNCHING TASKS
9 APPLICATIONS
9.1 XCODE 4
9.2 CATCHING MISTAKES WITH FIX-IT
9.3 USING THE SIMULATOR
10 HELLO THERE: A CORELOCATION APP
11 OTHER APPLICATION FUNCTIONS
11.1 ADDING AN ICON TO AN APP
11.2 CONVERTING A CREATED PROJECT IN XCODE TO AN APP
12 MAP BASED CORELOCATION APP
12.1 DISPLAY THE TEXT OF YOUR LOCATION
13 THE GATHERDATA APP
13.1 SETTING UP THE PROXY TOOL
13.2 STATIC SOURCE CODE ANALYSIS
13.3 DYNAMIC ANALYSIS
14 VULNERABLE APP: B.A.N.K.
15 ACCESSING DATA FROM BACKUP FILES
16 USING IOS AS AN ATTACK DEVICE
|