In Today's video we are going to continue the Reverse Engineering for Beginners series and we're discussing about iOS Exploits and Exploits in general. We're going to cover the Stack and security mechanisms like ASLR, DEP and Canaries, and I will explain in depth how a Buffer Overflow (most common exploit) works. In this video…
Category Archives: Reverse Engineering
Understanding Exploits – For Beginners (Part 1)
If you are here, you are most likely a beginner in the hacking community, so I'd like to give you a warm welcome 🙂 You decided to learn about exploits, and that is a good thing, so without further delays, I'd like to start making things clear about them. At first, being a beginner is…
How OS X 10.11.6 – ROOT Exploit Works (Explained)
In today's video I will show you a great OS X Exploit for ROOT Privileges Escalation and we're going to analyze how it works, what is the vulnerability behind it and how the exploit is being implemented. This powerful exploit spawns a root shell console even if the user from where the exploit is being…
iOS 10.1.1 Jailbreak – Changing Offsets to Work With iPhone 6 (And the rest)
In this video I will show you how to modify the new Project 0 Jailbreak for iOS 10.1.1 by changing the offsets to make it work with iPhone 6 or all other 64-Bit devices. In my previous video we discussed about this new Exploit and Jailbreak project that is open source and we talked about…
iOS 10.2 New Firmware Manager Version (28) Update + Lilo App
Today we have an important update for the F.C.E. 365 Firmware Manager Application for Windows. Aside of the bug fixes, the application now includes a new feature that builds automatically the F.C.E. 365 Lilo App used for iCloud Bypass debugging. The feature is now available inside the Toolbox on the final page. The bug fixes…
iOS 10 – How Jailbreak Works – BootChain and Kernel Protection (Part 1)
In this video, as you voted on my Twitter poll, I will start a small series of Jailbreak related talks. In these videos you will be able to understand the key points of the iOS Security, how these work, and what Jailbreakers do in order to obtain their privilege escalation . This 'course'' will give…
iOS – How to Patch Jailbreak Detection on iOS Apps (iOS Reverse Engineering)
In today's video I will show you how you can hack an iOS application to patch its Jailbreak detection modules so that you can make use of the app on Jailbroken devices. Apps that usually block your access on Jailbroken devices are: Financial apps (Internet Banking), some games like Pokemon Go, various apps from app…
iOS – How To Modify A Running App (Cycript) – iOS Reverse Engineering For Beginners
In today's video we continue the iOS Reverse Engineering series we started a couple of weeks ago. Today I will show you how to use Cycript to modify applications in real time directly on the device. For the sake of this tutorial, we're going to remotely modify SpringBoard to show a push notification with whatever…
iOS 10 / 10.1 – How to Decrypt The Ramdisk & Extract ASR On OS X
In today's video I show you how to properly decrypt iOS 10's Ramdisk and extract ASR Application on OS X. You probably know that iOS 10's Ramdisk, even if not protected with AES and IV keys, was still impossible to open on OS X due to the an image related error. Now that xerub published…
iOS 10 – iPhone 7 – How to Decompress & Disassemble the Kernel | iPhone 5S iOS 9.3.5 Keys are up!
Today I will quickly show you how to decrypt / decompress and disassemble the iPhone 7 iOS 10 Kernel. Strange enough, this new iPhone's Kernel came with a strange container that has to be decompressed before it can be loaded in IDA Pro or Hopper for disassembling, kinda strange keeping in mind that all the…
- ← Previous
- 1
- 2
- 3
- Next →