iPhone Application Security         Course Overview                 Satish.B                 Email:                 satish...
Course ContentIntroduction to Mobile applicationsMobile Application Security       Types of Mobile Applications       Mobi...
Pentest environment setup      iGoat setup      iOS simulator Vs iOS devicesiOS Application traffic analysis      Capturin...
iPhone Passcode Bypass      Data recovery techniquesiPhone Backup analysis      Reading backups      Encrypting & Decrypti...
Upcoming SlideShare
Loading in …5
×

iPhone application security course overview

6,438 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
6,438
On SlideShare
0
From Embeds
0
Number of Embeds
3,882
Actions
Shares
0
Downloads
70
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

iPhone application security course overview

  1. 1. iPhone Application Security Course Overview Satish.B Email: satishb3@securitylearn.net
  2. 2. Course ContentIntroduction to Mobile applicationsMobile Application Security Types of Mobile Applications Mobile Application architectures Comparison between iPhone, Android & Blackberry applications Mobile MalwareiOS Architecture iTunes OS Upgrading/Downgrading/Restoring iOS Internals – Kernel, RamDisk iOS Layers File System Permission model iOS Backups Comparison with Android ArchitectureiOS Security features Code Signing Passcode protection Data Protection/ Protection classes Sand Boxing ASLR/DEP Data Wipe Encrypted Backups Comparison with Android Security FeaturesiOS Security loop holes JailBreaking Unlocking Hactivation Breaking Data protection/sand boxingiOS Application distribution models Device distribution Adhoc distribution OTA distribution In-house distribution AppStore distribution 2 http://www.securitylearn.net
  3. 3. Pentest environment setup iGoat setup iOS simulator Vs iOS devicesiOS Application traffic analysis Capturing HTTP traffic MITM SSL Traffic Custom protocol analysis Overview of Web Application attacks Security Best practicesLocal Data Storage analysis Property lists Keychain – Sqlite database Web Kit Storage Cookies Custom encrypted files Security Best practicesData caching Screenshots Keyboard cache Security Best practicesURL Schemes Implementation of URL Schemes Security Best practices Facebook URL Scheme analysisReverse engineering iPhone Applications Decrypting iPhone Apps Run time debugging with GNU Debugger Secure practices Restricting JailBreak Demo - TwitterMajor mobile application threats OWASP Top 10 mobile application risks Veracode Top 10 mobile application riksPush notifications Understanding push notifications Secure Implementation 3 http://www.securitylearn.net
  4. 4. iPhone Passcode Bypass Data recovery techniquesiPhone Backup analysis Reading backups Encrypting & Decrypting backups Security LoopholesEnterprise iPhone Application securityiPhone Application Security ChecklistContactSatish BEmail: satishb3@securitylearn.net satishb3@hotmail.com 4 http://www.securitylearn.net

×