2014
5:50 hours
├── 01 Getting Started wih iOS PenTesting Course
│ ├── 001 Course Introduction.mp4
│ ├── 002 Credits.mp4
│ ├── 003 Introduction to iOS.mp4
│ ├── 004 iOS Application Basics.mp4
│ ├── 005 iOS Architecture.mp4
│ ├── 006 Setting up Xcode.mp4
│ └── 007 Adding functionality to our helloworld app.mp4
├── 02 iOS Security Model
│ ├── 001 Inbuilt Security Model.mp4
│ └── 002 Enabling and checking for inbuilt security controls in iOS apps.mp4
├── 03 Setting up an iOS PenTesting Lab
│ ├── 001 Jailbreaking basics.mp4
│ └── 002 Installing required tools in iDevice.mp4
├── 04 Penetration Testing iOS Apps — Insecure Local Data Storage
│ ├── 001 Installing challange Apps.mp4
│ ├── 002 iOS App Directory Structure.mp4
│ ├── 003 SQLite Data.mp4
│ ├── 004 plist files.mp4
│ ├── 005 NSUser Defaults.mp4
│ ├── 006 Core Data.mp4
│ └── 007 Keychain.mp4
├── 05 Penetration Testing iOS Apps — Unintended Data Leakage
│ ├── 001 Logging.mp4
│ ├── 002 App Backgrounding.mp4
│ ├── 003 keyboard Cache.mp4
│ └── 004 Pasteboard.mp4
├── 06 Penetration Testing iOS Apps — Client Side Injection
│ ├── 001 SQL Injection.mp4
│ └── 002 Cross-Site Scripting Attacks – XSS.mp4
├── 07 Traffic Analysis
│ ├── 001 Intercepting HTTP Traffic.mp4
│ ├── 002 Intercepting HTTPS Traffic.mp4
│ └── 003 Monitoring network trafficTCPIP.mp4
├── 08 RunTime Analysis
│ ├── 001 Dumping class information of preinstalled apps.mp4
│ ├── 002 Dumping class information of apps installed from App Store.mp4
│ ├── 003 Cycript Basics.mp4
│ ├── 004 Runtime Code Injection using Cycript.mp4
│ ├── 005 Accessing and modifying variables using Cycript.mp4
│ ├── 006 Exploiting authentication using Cycript.mp4
│ ├── 007 Method Swizzling using Cycript.mp4
│ ├── 008 Bypassing Jailbreak detection using Cycript.mp4
│ ├── 009 Method Swizzling using Snoop-it.mp4
│ ├── 010 App monitoring using snoop-it.mp4
│ ├── 011 Runtime analysis with GDB.mp4
│ └── 012 Runtime Analysis using Snoop-It.mp4
├── 09 Network Attacks
│ ├── 001 Cydia Default password exploitation with Metasploit.mp4
│ ├── 002 Cracking OpenSSH passwords using Hydra.mp4
│ ├── 003 Metasploit bindshell on iDevices.mp4
│ └── 004 Metasploit reverse shell iDevices.mp4
└── 10 Reverse Engineering
├── 001 Introduction to Reverse Engineering.mp4
├── 002 Reversing iOS Apps-1.mp4
├── 003 Reversing Engineering iOS Apps-2.mp4
├── 004 Reversing Apps-3.mp4
└── 005 Reverse Engineering -Apps 4.mp4