During this training, participants will discover the ecosystem and the fundamental bricks of the iOS operating system. They will discover the macOS toolchain used to deploy applications, and the debugging and diagnostic tools.
Participants will be teached fundamentals to reverse-engineer applications and system services: Objective-C internals, IPC mechanisms (XPC, NSXPC) and kernel APIs.
Practical examples and exercices built on iOS 17 will guide them all along the training. Hardware and software security measures unique to iOS will be covered, from both userland and kernel perspectives.
Synacktiv
@0xdagger
Quentin Meffre is a security researcher at Synacktiv.
His main interests are vulnerability research and exploit development. He especially likes iOS security.
He has spoken at international conferences including, Hexacon, BlackHat EU and SSTIC.
Day 1: Introduction to reverse engineering on Apple platforms
Day 2: Mach mechanisms
Day 3: Reverse engineering Mach services
Day 4: XNU security
iOS for Security Engineers is an intermediate level course, designed for security engineers wishing to perform research on this system:
Good knowledge of C development and basic knowledge in reverse engineering are recommended.