Chip Security TestingΒ 
Binary Security AnalysisΒ 
ResourcesΒ 
Blog
Contact us
eShard
/
escoaching
/
Static Analysis IOS Part 1
Intermediate

Static Analysis of an iOS application, Part 1

In this module, you will get knowledge on manual static analysis of an iOS application. You will understand few rules of thumb that can be used to have a systematic approach while manually reverse engineering. Focus will be particularly put on understanding how to analyse compiled Obj-C and Swift code.

This is the first part of a 2-parts training.

Covered Topics

What you will learn:

  • Understand the Mach-O format
  • Disassemble and decompile an application to start reviewing the code
  • How to review compiled Swift and Obj-C code
  • How to exploit meta information inside an objective-c code

Exercises

Multiple binaries and challenges are provided so that trainees can practice reverse engineering compiled Swift and Obj-C codes.

Requirements

  • MacOS
  • Jailbroken iPhone on iOS 13 and above
  • Xcode and the developer tools
  • An ARM disassembler like IDA (+Hex-Rays decompiler), or Ghidra
  • Basic understanding of the Objective-C and Swift programming languages
  • Basic understanding of the AARCH64 assembly language. (If beginner level, the module related to ARM is required)
Contact us

Practical information

Overall duration: 5 to 10 days

Schedule: 9:30am - 13pm (CET/CEST) - virtual/in person

Number of trainees: 2 trainees max.

Our Coaches

Yoan
Lefevre
Tiana
Razafindralambo
CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice