Рет қаралды 2,863
#jailbreakdetection #bypassjailbreakdetection #ios #mobilesecurity #arm64 #beginner #frida #ghidra #reverseengineering
In this video tutorial, we are going to see various entry level jailbreak detection techniques used in a sample application called DVIA-v2.
If you are new into the field of reverse engineering and wanted to get started in this field or if you are looking for some beginner friendly tutorial to get started in iOS app reverse engineering then this video is definately for you.
During the course of this video you will learn about some APIs which are used by the developers for Jailbreak detection such as "canOpenURL", "fileExistsAtPath" and many more. Along with this it will also help in understanding the approach to be used while doing a pentesting/reverse engineering of iOS applications.
You will also learn how to use "Ghidra" disassembler.
The final script used in this tutorial can be downloaded from here: github.com/fat...
If you liked this video then dont forget to give it a thumbs up and dont leave without subscribing to the channel. Also, if you have any doubts feel free to ask it in the comments section.
Join us on:
Twitter: / secfatal
Telegram: t.me/SecFatal