Categories
Tags
8ksec 8ksec.io aidl android anti-debug anti-frida anti-hook APK broadcast-receiver bypass CC certification config content-provider CTF ctf cybersecurity cybertalents deep-links deeplink dex dexclassloader dylib dynamic-analysis dynamic-loading emulator exam exploitation file-encryption flutter frida ghidra hextree.io hook hooking http-security ios ipc ISC2 jailbreak-detection Kali kiosk-mode logic-bug mobile mobile-exploitation native network-interception pentest plugin privacy proxy-detection rce reverse-engineering runtime script security smali sql-injection static-analysis swift tls-pinning token-extraction url-parsing url-scheme vulnerability web webview writeup WSL2
61 words
1 minutes
MobileHackingLabs iOS Challenges
My n00b Journey Through iOS Security Challenges
Welcome to my writeup series for the MHL iOS Application Exploitation Challenges. As a n00bie in iOS Security, I’m documenting my journey through 11 vulnerable iOS applications that cover everything from password managers to privacy tools. Each challenge teaches different exploitation techniques including reverse engineering, dynamic analysis, and vulnerability discovery. Will it be easy? :“D
MHL iOS Challenges
Challenge 01: Captain Nohook
Bypassing iOS anti-debug/anti-hook checks and dumping the flag from memory using Frida.
1343 words
|
7 minutes

Challenge 02: No Escape
Bypassing custom Swift jailbreak detection by reverse engineering and hooking with Frida.
817 words
|
4 minutes

