Bypassing Jailbreak Detection in iOS - Beginner Friendly

FatalSec
FatalSec
1.9 هزار بار بازدید - 12 ماه پیش - #jailbreakdetection
#jailbreakdetection #bypassjailbreakdetection #ios #mobilesecurity #arm64 #beginner #frida #ghidra #reverseengineering In this video tutorial, we are going to see various entry level jailbreak detection techniques used in a sample application called DVIA-v2. If you are new into the field of reverse engineering and wanted to get started in this field or if you are looking for some beginner friendly tutorial to get started in iOS app reverse engineering then this video is definately for you. During the course of this video you will learn about some APIs which are used by the developers for Jailbreak detection such as "canOpenURL", "fileExistsAtPath" and many more. Along with this it will also help in understanding the approach to be used while doing a pentesting/reverse engineering of iOS applications. You will also learn how to use "Ghidra" disassembler. The final script used in this tutorial can be downloaded from here: github.com/fatalSec/iOS_DVIA_OWASP_Top10 If you liked this video then dont forget to give it a thumbs up and dont leave without subscribing to the channel. Also, if you have any doubts feel free to ask it in the comments section. Join us on: Twitter: twitter.com/SecFatal Telegram: t.me/SecFatal
12 ماه پیش در تاریخ 1402/06/30 منتشر شده است.
1,916 بـار بازدید شده
... بیشتر