iOS Reverse Engineering :: Part I :: Dynamic Reversing and iOS Basics

preview_player
Показать описание
The first part covers Frida basics, such as using frida-trace and the stalker. Then, some more internals about debugging on iOS in general are added, such as debug profile, enhancing logging with jailbreaks, and the debugserver.

Рекомендации по теме
Комментарии
Автор

Just discovered your videos. You are a blessing from god. Thank you for sharing all this!

rozn
Автор

I'm loving the channel so far, thank you!

Could you clarify more on this debugging combo method you talked about at the end?

"ios Debugger combo:
attach frida to inject fuzzing payload
set breakpoint in target. Attach debug server
Use IDA to decompile, press f5 and see your code, set breakpoint on something that looks like c code
while still having advantage of being able to inject something with frida."

So is this basically like a free workaround to have a dynamic way of interacting with IDA without paying for the pro/debugger setup? Would IDA free static analysis also be able to provide C-like code or is that only available with Pro version + IOkit?

drygordspellweaver
Автор

Hey jiska thanks for the videos, Im new to iOS security research I've been doing my research on ios baseband Im able to extract baseband firmware and RE the baseband but to debug I jailbreaked my iphone now I can't use simcard tried many ways to fix but It won't work or did I do anything wrong, or any other ways to emulate ios baseband firmware ? This would be helpful. I used iphone 7 ios 14.7.1

kiyotaka
Автор

Can you recommend a book or any other resources which is noob friendly

anasshaikh