In today's video I am glad to present you the second iteration o the Myriam application, on which I've been working for a while. Myriam application contains various iOS Security challenges so that people interested in iOS Reverse Engineering can start learning it while staying on the legal side.
In Beta 2 Myriam application comes with 2 new challenges: In-App Resource Modification and UIKit Manipulation. The In-App Resource Modification challenge requires you to fiddle with the logo of the Myriam Application from inside the ViewController. To do that, you need to play with the resources file which is packed.
The UIKit Manipulation part requires you to hack the application so that instead of loading the F.C.E. 365 Website, it will load your favorite website. This can be done in Hopper Disassembler or IDA fairly easy.
With Beta 2 I've also fixed a couple of bugs that were present on the other challenges and I've improved the interface so that you can easily close a challenge if you don't want to continue.
You can learn how to work with the App by checking out my iOS Reverse Engineering Playlist available down bellow.