In today's video I will be showing you how to patch / hack a simple C or C++ application using Hopper Disassembler on macOS. C applications are quite practical to start with because you can deploy them fairly easy on a Jailbroken device and you can even try to reverse engineer it there (although MTerminal…
Tag Archives: iOS Reverse Engineering
iOS 10.3.1 App Hacking – Myriam App B2 Released
In today's video I am glad to present you the second iteration o the Myriam application, on which I've been working for a while. Myriam application contains various iOS Security challenges so that people interested in iOS Reverse Engineering can start learning it while staying on the legal side. In Beta 2 Myriam application comes…
iOS App Hacking – How to Patch Log In Challenge (Myriam App)
In today's video I will demonstrate patching Myriam iOS Application's second challenge, that being a log in screen for which we don not know the password nor the username. This will involve static binary analysis and therefore NO JAILBREAK is required to complete this challenge. Myriam Application is a CFT-style app that I have created…
iOS App Hacking – Myriam iOS Security App Released (For Beginners)
Today I am glad to present you an application on which I've been working for a straight month. Created specially for those of you interested in iOS Security, and iOS App Hacking, Myriam is an application containing various levels of vulnerabilities for you to explore and exploit. The application itself follow a neatly organized user…
How to Start iOS Hacking | Reverse Engineering With Radare2
It's been a while since I made a reverse engineering (hacking, disassembling, patching, etc.) video, and therefore, today I've prepared something for those of you interested into getting started with INFOSEC, and iOS Hacking to be more specific. Aren't you sick of seeing hackers bragging about what they can do? Don't you want to learn…
iOS 10 – Explaining Exploits / Buffer Overflows (For Beginners)
In Today's video we are going to continue the Reverse Engineering for Beginners series and we're discussing about iOS Exploits and Exploits in general. We're going to cover the Stack and security mechanisms like ASLR, DEP and Canaries, and I will explain in depth how a Buffer Overflow (most common exploit) works. In this video…
iOS 10 – How Jailbreak Works – BootChain and Kernel Protection (Part 1)
In this video, as you voted on my Twitter poll, I will start a small series of Jailbreak related talks. In these videos you will be able to understand the key points of the iOS Security, how these work, and what Jailbreakers do in order to obtain their privilege escalation . This 'course'' will give…
iOS – How to Patch Jailbreak Detection on iOS Apps (iOS Reverse Engineering)
In today's video I will show you how you can hack an iOS application to patch its Jailbreak detection modules so that you can make use of the app on Jailbroken devices. Apps that usually block your access on Jailbroken devices are: Financial apps (Internet Banking), some games like Pokemon Go, various apps from app…
iOS – How To Modify A Running App (Cycript) – iOS Reverse Engineering For Beginners
In today's video we continue the iOS Reverse Engineering series we started a couple of weeks ago. Today I will show you how to use Cycript to modify applications in real time directly on the device. For the sake of this tutorial, we're going to remotely modify SpringBoard to show a push notification with whatever…
iOS Reverse Engineering (For Beginners) – iOS SandBox, iOS File Types, Frameworks, Permissions, APIs
Today, we continue the series we started yesterday about iOS Reverse Engineering & Development for Beginners. In today's video I explain you about iOS structure, the file system hierarchy (on iOS 10), about the Kernel and the SandBox (and why we need to race it on Jailbreak), we discuss about iOS Access Permissions of different…