This course covers everything from iPhone development and application security to hacking iOS and its applications. iOS Attack & Defend is a lab-intensive programming and reverse engineering course designed for students who need a working knowledge of iOS development and exploitation. In this course, we will demonstrate how iOS works internally and discover key locations where data is stored and how to extract it. Students will also use tools to discover security vulnerabilities, decompile and reverse engineer iOS binaries, harvest geo-location data, jailbreak iOS devices, and perform remote data mining. The course will teach students to deploy, execute, and test their own programs using an iOS debugger in both an emulation environment and on an iOS device. In the capstone exercise, students will use the tools, skills, and methodologies they have learned to develop an iOS Trojan horse application that provides remote control and information extraction
Day 5 – Student Practical Demonstration
Using the tools, skills, and methodologies taught in Days 1 through 4 of the class, students will have to develop an iPhone Trojan Horse application. The malware application written will provide a variety of remote control as well as information extraction capabilities.