From the course: Ethical Hacking: Mobile Devices and Platforms
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Securing iOS applications by design - iOS Tutorial
From the course: Ethical Hacking: Mobile Devices and Platforms
Securing iOS applications by design
- [Instructor] The iOS operating system is designed to be secure. And the way in which Apple manages applications provides additional security over their supply. Security in iOS starts when the user switches on the device. The Boot ROM hardware contains read-only code to bootstrap the system and Apple's public key. The public key is used to verify the integrity of the second stage low-level boot code. The low-level boot takes the second stage boot load, known as iBoot, from flash memory and verifies its signature before loading it. Similarly, the iBoot verifies the integrity of the kernel before loading it. This provides a fully secure startup through to kernel, and the remainder of the operating system can then be loaded. The operating system provides a number of features able to be used by application developers to secure their code. Unfortunately, not all developers use these to their fullest extent, which is why we test applications. We've already seen that applications operate…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
iOS applications and vulnerabilities4m 40s
-
Securing iOS applications by design4m 52s
-
Jailbreaking for command-line access6m 45s
-
More jailbreak and extractor tools1m 42s
-
Preparing to test iOS applications3m 45s
-
Extracting properties and class headers5m 28s
-
Disassembling iOS executable code5m 36s
-
Advancing into dynamic analysis of iOS6m 25s
-
-
-