Link:http://www.securitylearn.net/tag/apple-ios-hacking-slides/
A collection of iOS research presentations, videos and interesting papers-
iOS Hacking:
Title |
Year |
Author |
Download link |
Fuzzing the Phone in your Phone |
2009 |
Charlie Miller & |
Paper |
iPhone security model & vulnerabilities |
2010 |
Cedric Halbronn & |
|
iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility |
2010 |
Mona Bader & Ibrahim Baggili |
Paper |
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 |
2011 |
Andrey Belenko & Dmitry Sklyarov |
Slides |
iPhone Forensics on iOS 5 |
2011 |
Satishb3 |
Paper, Video |
Forensic Analysis of iOS Backups |
2011 |
Satishb3 |
Paper, Video |
Overcoming iOS data protection to re-enable iPhone Forensics |
2011 |
Andrey Belenko |
|
Apple iOS 4 Security Evaluation |
2011 |
Dino A. Dai Zovi |
|
Practical Consideration of iOS Device |
2011 |
Jens Heider & Matthias Boll |
|
iPhone data protection in depth |
2011 |
Jean-Baptiste Bedrune & Jean Sigwald |
|
Exploiting The iOS Kernel |
2011 |
Stefan Esser |
|
iOS Kernel Exploitation – IOKIT Edition |
2011 |
Stefan Esser |
|
Targeting the iOS kernel |
2011 |
Stefan Esser |
|
The Apple Sandbox |
2011 |
Dionysus Blazakis |
|
The iOS MDM Protocol |
2011 |
David Schuetz |
|
iPhone Exploitation One ROPe to bind them all? |
2011 |
Stefan Esser |
|
iOS Forensics: Overcoming iPhone Data Protection |
2011 |
Andrey Belenko |
|
Handling iOS encryption in a forensic investigation |
2011 |
Jochem van Kerkwijk |
|
IPhone backup files. A penetration tester’s treasure |
2011 |
SANS |
|
iPhone Forensics with F/OSS |
2011 |
ViaForensics |
|
Evolution of iPhone Baseband and unlocks |
2012 |
MuscleNerd |
|
iPhone data protection in depth |
2012 |
Jean-baptiste.bedrune & Jean.sigwald |
|
Corona Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
iOS Security |
2012 |
Apple |
|
Absinthe Jailbreak for iOS 5.0.1 |
2012 |
Jailbreak Dream team |
|
Breaking iOS code signing |
2012 |
Charlie Miller |
|
Overview on Apple iOS Security |
2012 |
Ahmad Reza Sadeghi |
|
iOS 5 – an exploitation night mare |
2012 |
Stefan Esser |
|
Jailbreaking Techniques |
2012 |
Pod2g |
|
iOS 6 kernel security: A Hacker’s guide |
2012 |
Mark Dowd & |
|
Swiping Through Modern Security Features |
2013 |
evad3rs |
|
iOS 6 Exploitation 280 days later |
2013 |
stefan esser |
|
iOS Vulnerabilities Garage Sale |
2013 |
stefan esser |
|
Hacking Apple Accessories to pown iDevices |
2013 |
Mathieu Renard |
|
Injecting Malware into iOS Devices via Malicious Chargers |
2013 |
Billy Lau & Yeongjin Jang & Chengyu Song |
iOS Hardening
Title |
Year |
Author |
Download link |
iOS Hardening Configuration Guide |
2012 |
Australian Government |
|
Apple iOS Security in the Enterprise |
2012 |
Oliver Karow |
iOS Application Hacking
Title |
Year |
Author |
Download link |
Penetration testing of iPhone/iPad applications |
2010 |
Kunjan Shah |
|
New age application attacks against Apple iOS and countermeasures |
2011 |
Nitesh Dhanjani |
|
Hacking and Securing Next Generation iPhone and iPad Apps |
2011 |
Nitesh Dhanjani & Sean Pennline |
|
Secure Development on iOS – Advice for developers and penetration testers |
2011 |
David Thiel |
|
Pentesting iPhone & iPad Apps |
2011 |
Flora Bottaccio & |
|
Detecting Privacy Leaks in iOS Applications |
2011 |
Manuel Egeley, Christopher Kruegel, Engin Kirdaz & |
|
Evaluating iOS Applications |
2011 |
Dominic Chell |
|
iOS applications reverse engineering |
2011 |
Julien Bachmann |
|
Attacking iPhone & iPad Applications |
2011 |
Sebastien Andrivet |
|
Pentesting iPhone applications |
2011 |
Satishb3 |
|
iOS Application (In)Security |
2012 |
Dominic Chell |
|
Auditing iPhone and iPad applications |
2012 |
Ilja van Sprundel |
|
iOS SSL kill switch |
2012 |
Justine Osborne & |
|
Smart Phones Security |
2012 |
Tomáš Rosa |
|
Hacking and securing iOS applications |
2012 |
Satishb3 |
|
Attacking iPhone Applications |
2012 |
Chilik Tamir |
|
Practical iOS Applications Hacking |
2012 |
Mathieu RENARD |
|
Pentesting iOS Apps Runtime Analysis and |
2012 |
Andreas Kurtz |
|
Pentesting iOS Applications |
2013 |
Jason Haddix |
|
iAnalyzer-No More Blackbox iOS Analysis |
2013 |
Chilik Tamir |
|
Protecting Sensitive information on iOS devices |
2013 |
Darth Null |
|
How to assess and secure iOS apps |
2013 |
NccGroup |
Best Sites:
1. www.theiphonewiki.com
2. https://code.google.com/p/iphone-dataprotection/
Best Books:
1. Hacking and Securing iOS Applications
2. iOS Hackers hand book