Bypassing iOS Anti Reversing Defences Using Frida
ฝัง
- เผยแพร่เมื่อ 29 ก.ย. 2024
- #iospentesting #mobilesecurity #owasp #anti-reversing
This video will provide a walkthrough on dynamically bypassing anti-debugging and anti-reversing defences used in iOS applications.
For the purpose of this video we are going to use ios-challenge-2 provided by OWASP Foundation as a part of their mobile security testing guide.
You can download the challenge application as well as the bypass script from our repository:
github.com/fat...
Detections explained in this video:
Debugger based detection:
- ptrace
- sysctl
- getppid
Frameworks based detection:
- dyld_get_image_name
- strstr
If you like our content and learned something then don't go without subscribing to our channel.
Connect with us on:
X: @SecFatal
Telegram: t.me/SecFatal
Also, if you like what we are doing and want to support us you can buy us a coffee: www.buymeacoff...
really well explained hope u make more iOS tutorials
Sure, I have plans for more iOS videos.
@@fatalsec really glad to hear that always looked for a yt channel like yours keep it up
Awsome video. Great stuff for iOS but can u make more videos on frida detection bypass on android. also do you provide any training for this kind of stuff
Thanks for reaching out. Yes we do provide trainings. You can contact us on secfatal@proton.me for more details.
Hey bro, I actually emailed you because I want to learn complete Frida scripting to bypass SSL pinning in apps. Could you please teach me this? and I'm okay with paying for it
Can someone update flex 3 with this?
May I know what’s flex3?
Good content, if possible i want to know about how unidbg work thanks.
Okay noted. One clarification though, you want to know how unidbg works or how to use unidbg?
Happy for this🤞🏾
Bro please make a video on appsealing security bypass they protect .so files and it's hard to repack
Please make a tutorial on how to unlock donation of app cloner.....?
1st fans.
здарова индус