Penetration Testing With Kali Linux
  51 lectures 6 hours  All Levels
Price 3000 Rs.
Preview this course
IPT: iOS Penetraion Testing Course
iOS Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on PenTesting iOS Mobile Apps.
This course is intended students/professionals who are intended to make career in mobile penetration testing domain.

The course covers in and out of , actually Hacking (Penetration) iOS Apps and hacker computer school have developed vulnerable iOS Apps for students to practice Labs. hacker computer school  will share 11 such applications to learn Hacking iOS Mobile Applications.

iOS Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some iOS app security assessments, there will be something new for you. After completing this course, you will learn where to start iOS app penetration testing, Pentesting iOS Apps, Network monitoring on iDevices and finally some automated tools to complete the task. It contains more than 14 challenges to crack. Instructor explains all the solutions when and where it is required.

The course is designed as a complete guide to understand and practice iOS Mobile app hacking efficiently in real time.
This is online certification Course by  hacker computer school  and your doubts related to the subject are solved for ever on discussion board. We provide you material and references to get more understanding and learning this tool.
The course is very well structured, explaining the terminologies , functionality and lab practical's are very well shown as feeding baby a banana.
Curriculum For This Course
    1-Course-Introduction (6:15)
    2-credits (3:00)
      3-introduction-to-ios (4:23)
       4-ios-app-basicsmp4 (4:01)
     5-ios-architecturemp4 (9:09)
    6-setting-up-xcode (7:45)
    7-adding-functionality-to-helloworld-app (9:58)
    8-Inbuilt-security-model (9:04)
    9-SECURITY CONTROLs (7:26)
    10-JAILBREAKING BASICS (7:40
    11-INSTALLATIONS (18:22))
    12-INSTALLING CHALLANGE APPS (7:48)
    13-IOS APP DIRECTORY STRUCTURE (12:01)
    14-SQLITE DATA (10:50)
    15-PLIST FILES (6:04)
    16-NSUSER DEFAULTS (3:41)
    17-CORE-DATA (5:36)
    18-KEYCHAIN (9:12)
    19-LOGGING (4:18)
    20-APP BACKGROUNDING (6:01)
    21-KEYBOARD CACHE (3:26)
    22-PASTEBOARD (2:50)
    23-SQL INJECTION (4:50)
    24-CROSS-SITE SCRIPTING ATTACKS - XSS (5:12)
    25-INTERCEPTING HTTP TRAFFIC (8:57)
    26-INTERCEPTING HTTPS TRAFFIC (7:16)
    27-MONITORING NETWORK TRAFFIC(TCPIP) (6:15)
    28-DUMPING CLASS INFORMATION OF PREINSTALLED APPS (6:17)
    29-DUMPING CLASS INFORMATION OF APPS INSTALLED FROM APP STORE (8:49)
    30-CYCRIPT BASICS (13:48)
    31-RUNTIME CODE INJECTION USING CYCRIPT (5:11)
    32-ACCESSING AND MODIFYING VARIABLES USING CYCRIPT (6:34)
    33-EXPLOITING AUTHENTICATION USING CYCRIPT (6:34)
    34-METHOD SWIZZLING USING CYCRIPT (5:47)
tart    35-BYPASSING JAILBREAK DETECTION USING CYCRIPT (9:42)
    36-METHOD SWIZZLING USING SNOOP-IT (12:04)
    37-APP MONITORING USING SNOOP-IT (3:27)
    38-RUNTIME ANALYSIS WITH GDB (8:45)
    39-RUNTIME ANALYSIS USING SNOOP-IT (12:04)
    40-CYDIA DEFAULT PASSWORD EXPLOITATION WITH METASPLOIT (8:10)
    41-CRACKING OPENSSH PASSWORDS USING HYDRA (5:21)
    42-METASPLOIT BINDSHELL ON IDEVICES (7:45)
    43-METASPLOIT REVERSE SHELL IDEVICES (8:44)
    44-INTRODUCTION TO REVERSE ENGINEERING (8:47)
    45-REVERSING IOS APPS-1 (4:59)
    46-REVERSING IOS APPS-2 (6:46)
    47-REVERSING IOS APPS-3 (3:46)
    48-REVERSING IOS APPS-4 (5:17)
Copyright © 2018 Hacker Computer School  All Rights Reserved