iOS architecture and security model; app sandbox, keychain, entitlements, code signing.
Static analysis and reversing with class-dump, Hopper/IDA; IPA handling.
Dynamic instrumentation with Frida/Objection; runtime method hooking and tracing.
Bypasses: jailbreak/root checks, SSL pinning, ATS policies.
Common flaws: insecure data storage, URL schemes, keychain misuse, WebView, ATS/config issues.
OWASP MASVS/MSTG‑aligned testing and reporting.
This iOS Security course equips you to assess native iOS apps. You'll reverse and instrument apps, analyze storage and network behaviors, and bypass common protections to validate security controls in a lab setting.
We follow OWASP MASVS/MSTG guidance, covering entitlements, keychain usage, ATS, certificate pinning, URL schemes and WebView. Tooling includes Frida/Objection, Hopper/IDA, class‑dump, mitmproxy and Xcode utilities.
