Embed presentation
Download to read offline








![FINDING CLASS AND METHODS
• ios hooking list classes
• ios hooking list class_methods Classname
• ios hooking search classes keywords
• ios hooking search methods classname
• ios hooking watch class classname --include-parents
• ios hooking set return_value "+[classname methodname]" false](https://image.slidesharecdn.com/objectiontoolusage-200705122053/75/Frida-Objection-Tool-Usage-9-2048.jpg)




Frida is a dynamic instrumentation toolkit that allows injecting JavaScript into applications. Objection is a runtime mobile exploration toolkit powered by Frida that helps assess the security of mobile apps. It supports iOS and Android. Objection allows exploring apps by listing classes, methods, and injecting scripts to enable dynamic analysis like dumping keychain entries.
Introduction to the presentation and agenda regarding the Objection tool and its functionalities.
Introduction of Dinesh, a Security Engineer at Briskinfosec, presenting on Frida and Objection.
Frida is a dynamic toolkit for application testing and reverse engineering, injecting JavaScript into multiple OS apps.
Frida is useful for static/dynamic analysis, patching applications, and bypassing security measures like SSL pinning.
Instructions to install Objection, a mobile security assessment toolkit utilizing Frida for iOS and Android apps.
Basic command for injecting applications using Objection for exploration and testing.
Overview of essential commands available in Objection for various tasks in mobile exploration.
Insights on executing static analysis with commands for iOS binary and bundle assessments.
Commands for finding classes and methods, enabling deeper inspection of iOS applications.
Dynamic analysis capabilities such as accessing cookies and dumping entries in the iOS keychain.
Final thoughts and summary of the presentation on using Objection and Frida.
Open floor for questions from the audience regarding the presentation content.








![FINDING CLASS AND METHODS
• ios hooking list classes
• ios hooking list class_methods Classname
• ios hooking search classes keywords
• ios hooking search methods classname
• ios hooking watch class classname --include-parents
• ios hooking set return_value "+[classname methodname]" false](https://image.slidesharecdn.com/objectiontoolusage-200705122053/75/Frida-Objection-Tool-Usage-9-2048.jpg)


