MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

iOS Application: Penetration Testing Ethical Hacking Domain

Course Summary

Get Expertise in iOS Apps Hacking

  • +

    Course Syllabus

    • Getting Started wih iOS PenTesting Course
      • Course Introduction
      • Credits
      • Introduction to iOS
      • iOS Application Basics
      • iOS Architecture
      • Setting up Xcode
      • Adding functionality to our “helloworld” app
    • iOS Security Model
      • Inbuilt Security Model
      • Enabling and checking for inbuilt security controls in iOS apps
    • Setting up an iOS PenTesting Lab
      • Jailbreaking basics
      • Installing required tools in iDevice
    • Penetration Testing iOS Apps -- Insecure Local Data Storage
      • Installing challange Apps
      • iOS App Directory Structure
      • SQLite Data
      • plist files
      • NSUser Defaults
      • Core Data
      • Keychain
    • Penetration Testing iOS Apps -- Unintended Data Leakage
      • Logging
      • App Backgrounding
      • keyboard Cache
      • Pasteboard
    • Penetration Testing iOS Apps -- Client Side Injection
      • SQL Injection
      • Cross-Site Scripting Attacks - XSS
    • Traffic Analysis
      • Intercepting HTTP Traffic
      • Intercepting HTTPS Traffic
      • Monitoring network traffic(TCP/IP)
    • RunTime Analysis
      • Dumping class information of preinstalled apps
      • Dumping class information of apps installed from App Store
      • Cycript Basics
      • Runtime Code Injection using Cycript
      • Accessing and modifying variables using Cycript
      • Exploiting authentication using Cycript
      • Method Swizzling using Cycript
      • Bypassing Jailbreak detection using Cycript
      • Method Swizzling using Snoop-it
      • App monitoring using snoop-it
      • Runtime analysis with GDB
      • Runtime Analysis using Snoop-It
    • Network Attacks
      • Cydia Default password exploitation with Metasploit
      • Cracking OpenSSH passwords using Hydra
      • Metasploit bindshell on iDevices
      • Metasploit reverse shell iDevices
    • Reverse Engineering
      • Introduction to Reverse Engineering
      • Reversing iOS Apps-1
      • Reversing Engineering iOS Apps-2
      • Reversing Apps-3
      • Reverse Engineering -Apps 4

Course Fee:
USD 250

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top