Skip to main content

MS 310 - Apple iOS Attack & Defend

Learn the fundamentals of Software Development and Hacking of the iPhone Operating System.

Apple iOS Attack & Defend provides hands-on training in the fundamentals of Software Development and Hacking for the iPhone Operating System from Apple. This course is a laboratory intensive programming course designed for students looking to gain a working knowledge in iPhone Development and Hacking. Through a combination of instructor-led examples and a series of programming assignments and challenges, students will build and enhance their practical knowledge of software development, exploitation and hacking in the iPhone Operating System. Additionally, students will learn how to deploy, execute, and test all developed programs on iPhone emulation software and iPhone hardware devices provided in the class.

Request Course Details

Attending students will learn

  • iPhone architecture and design
  • ARM Assembly Code and programming applications
  • Reverse engineering applications and de-compiling applications
  • Extracting information remotely
  • Geo-location and Jailbreaking

Who should attend

  • Programmers who want an introduction to mobile application development
  • Reverse Engineers who need a thorough understanding of ARM Assembly language
  • Red Team members who need training in Hacking iPhone devices
  • Security professionals that want a solid defense strategy for their mobile devices


  • Experience with Apple products such as MacBooks and iPhones are recommended
  • Programming experience in C, Python, Perl or Java are recommended

Course Outline

Day 1

  • iPhone Introduction
  • History
  • iPhone Versions
  • Inside the iPhone
  • Hardware
  • Memory Storage Unit
  • Operating System
  • The iPhone SDK
  • Coding iPhone Applications Crash Course
  • Cocoa
  • Objective C

Day 2

  • Why RE?
  • ARM Assembly
  • Header
  • Load Commands
  • Segments and Sections
  • The Process of Loading

Day 3

  • The Process of Binary RE
  • Encryption and Digital Signing
  • Bypassing Encryption of AppStore Binaries.
  • iPhone Binary Internals
  • Disassembling a Binary

Day 4

  • Learning the Language of iPhone Hacking
  • Discovering iPhone's Hackability
  • Jailbreaking the iPhone
  • Installing Third-Party Apps
  • Manipulating iPhones FileSystem
  • Backing up iPhones Files
  • Extracting Text Messages
  • Extracting Address Books
  • Extracting Voicemails
  • Extracting Browsing History
  • Tracking an iPhone (Geo-Location)
  • Connecting to an iPhone via the Internet
  • Tethering the iPhone
  • Wi-Fi Hacks

Day 5 – Student Practical Demonstration

Using the tools, skills, and methodologies taught in Days 1 through 4 of the class, students will have to develop an iPhone Trojan Horse application. The malware application written will provide a variety of remote control as well as information extraction capabilities.

Courses That Follow This Course

Request More Info About This Course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...