UMBC Training Centers logo

iPhone and iPad Security & Exploitation

 

Course Description | Outline | Cybersecurity Training | IT Training

Outline

1 PRODUCTS
    1.1 IPHONE
    1.2 IPHONE VERSIONS
    1.3 IPAD
    1.4 IPAD VERSIONS
    1.5 FIRMWARE
    1.6 IOS
    1.7 ICLOUD

2 INTRO TO THE MAC
    2.1 ITUNES PREFERENCES

3 VOICEOVER ACCESSIBILITY

4 JAILBREAKING 21
    4.1 EXCLUSIVE CHIP IDENTIFICATION NUMBER
    4.2 TETHERED VERSUS UNTETHERED JAILBREAKING

5 JAILBROKEN APPS
    5.1 INSTALL CYDIA AND OPENSSH
    5.2 MANAGING 3RD PARTY APPS

6 IPHONE FILESYSTEM ACCESS AND STRUCTURE
    6.1 IPHONE FILE SYSTEM ACCESS
    6.2 SQLITE MANAGER

7 DATA PROTECTION

8 PLIST FILES
    8.1 AUTO LAUNCHING TASKS

9 APPLICATIONS
    9.1 XCODE 4
    9.2 CATCHING MISTAKES WITH FIX-IT
    9.3 USING THE SIMULATOR

10 HELLO THERE: A CORELOCATION APP

11 OTHER APPLICATION FUNCTIONS
    11.1 ADDING AN ICON TO AN APP
    11.2 CONVERTING A CREATED PROJECT IN XCODE TO AN APP

12 MAP BASED CORELOCATION APP
    12.1 DISPLAY THE TEXT OF YOUR LOCATION

13 THE GATHERDATA APP
    13.1 SETTING UP THE PROXY TOOL
    13.2 STATIC SOURCE CODE ANALYSIS
    13.3 DYNAMIC ANALYSIS

14 VULNERABLE APP: B.A.N.K.

15 ACCESSING DATA FROM BACKUP FILES

16 USING IOS AS AN ATTACK DEVICE