Categories
Tags
8ksec.io android anti-debug anti-hook APK broadcast-receiver CC certification config content-provider CTF cybersecurity cybertalents deep-links emulator exam exploitation file-encryption flutter frida hextree.io http-security ios ipc ISC2 jailbreak-detection Kali kiosk-mode mobile mobile-exploitation network-interception pentest reverse-engineering script smali sql-injection swift tls-pinning token-extraction vulnerability web writeup WSL2
61 words
1 minutes
MobileHackingLabs iOS Challenges
My n00b Journey Through iOS Security Challenges
Welcome to my writeup series for the MHL iOS Application Exploitation Challenges. As a n00bie in iOS Security, I’m documenting my journey through 11 vulnerable iOS applications that cover everything from password managers to privacy tools. Each challenge teaches different exploitation techniques including reverse engineering, dynamic analysis, and vulnerability discovery. Will it be easy? :“D
MHL iOS Challenges
Challenge 01: Captain Nohook
Bypassing iOS anti-debug/anti-hook checks and dumping the flag from memory using Frida.
1343 words
|
7 minutes

Challenge 02: No Escape
Bypassing custom Swift jailbreak detection by reverse engineering and hooking with Frida.
817 words
|
4 minutes

