Security in Integrated Circuit 
Blog
Contact us
eShard
/
escoaching
/
Static Analysis IOS Part 1
Intermediate

Static Analysis of an iOS application, Part 1

In this module, you will get knowledge on manual static analysis of an iOS application. You will understand few rules of thumb that can be used to have a systematic approach while manually reverse engineering. Focus will be particularly put on understanding how to analyse compiled Obj-C and Swift code.

This is the first part of a 2-parts training.

Covered Topics

What you will learn:

  • Understand the Mach-O format
  • Disassemble and decompile an application to start reviewing the code
  • How to review compiled Swift and Obj-C code
  • How to exploit meta information inside an objective-c code

Exercises

Multiple binaries and challenges are provided so that trainees can practice reverse engineering compiled Swift and Obj-C codes.

Requirements

  • MacOS
  • Jailbroken iPhone on iOS 13 and above
  • Xcode and the developer tools
  • An ARM disassembler like IDA (+Hex-Rays decompiler), or Ghidra
  • Basic understanding of the Objective-C and Swift programming languages
  • Basic understanding of the AARCH64 assembly language. (If beginner level, the module related to ARM is required)
2000€
Contact us

Practical informations

Overall duration: 5 to 10 days

Schedule: 9:30am - 13pm (CET/CEST) - virtual/in person

Number of trainees: 2 trainees max.

Our Coaches

Tiana
Razafindralambo
Yorick
Lesecque
© eShard 2021. All rights reserved
Privacy policy | Legal Notice
Bâtiment GIENAH
11 avenue de Canteranne
33600 Pessac
France
eShard Nudge
7 rue Gaston de Flotte
13012 Marseille
France
eShard GmbH
Beethovenallee 21
53173 Bonn
Germany
Paya Lebar Quarter
#04-01 Paya Lebar Link
408533
Singapore