SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Slicing into Apple: iPhone Reverse Engineering,[object Object],Ryan PermehTrace TeamMcAfee,[object Object]
Introduction,[object Object],Reverse engineering is taking a finished product and working back towards it’s constituent artifacts,[object Object],Gives us a peek behind the curtains of software,[object Object],Helpful for a variety of legitimate uses,[object Object],Better understanding how software works,[object Object],Recovering lost knowledge,[object Object],Interfacing to closed systems,[object Object],Finding security issues,[object Object],May be used illegally,[object Object],DCMA, software piracy, IP theft,[object Object]
Skill Outlay,[object Object],Reverse engineering is a very technical subject,[object Object],Requires a deep understanding of several topics,[object Object],Hardware Architecture,[object Object],Software Architecture,[object Object],Operating system internals,[object Object],Assembly language,[object Object],Higher level languages,[object Object],Compiler, linker, and loader internals,[object Object],Debugging,[object Object],The better you understand how software is made, the easier it is to reverse engineer it.,[object Object]
JailBreak your iPhone,[object Object],You really need to be jailbroken to have a platform to work from,[object Object],Jailbreak breaks signing requirements for applications,[object Object],Opens the phone up to a variety of new uses,[object Object],Run software from other sources,[object Object],Develop software without need for Apple Developer cost,[object Object],Allows you access to the internals of the iPhone,[object Object],Jailbreak for 4.3.3 and beyond,[object Object],This changes often, so do your research,[object Object],Jailbreaking happens via an exploit, leveraged to patch the kernel,[object Object],Install Cydia and use that to install your tools,[object Object],Gcc/gdb,[object Object],SSH access,[object Object],Class-dump,[object Object],Whatever else you want,[object Object]
Tools used,[object Object],Reverse engineering leverages several tools to get a better understanding of the code,[object Object],Disassembler,[object Object],Parses finished code into assembly language,[object Object],Understand and visualize program flow ,[object Object],Provides cross references, searching, and other useful tools,[object Object],We use IDA Pro 6.0 in these examples,[object Object],Debugger,[object Object],Offers a view of the program at runtime,[object Object],Helpful for dynamic analysis,[object Object],Can tie into other reverse engineering artifacts,[object Object],We use gdb in these examples,[object Object]
Tools - iPhone Specific,[object Object],Clutch – http://clutch.hackulo.us,[object Object],Tool to crack software,[object Object],Handles decrypting binaries automatically,[object Object],class-dump - http://www.codethecode.com/projects/class-dump/,[object Object],Dumps internal Objective-C objects,[object Object],Helps understand interfaces, objects in project,[object Object],Itunnel - http://www.cs.toronto.edu/~jingsu/itunnel/,[object Object],Useful for connecting from a host machine directly to a jailbrokeniphone,[object Object],For windows and unix (windows – search for itunnel.exe),[object Object],Used in lieu of a WIFI connection,[object Object]
Inside the iPhone,[object Object]
Hardware,[object Object],Processor: ARM Cortex A8,[object Object],Developed by Apple and Samsung,[object Object],Latest devices use A4 designation,[object Object],32 bit RISC architecture,[object Object],Uses thumb extensions,[object Object],Radio functionality,[object Object],3g,[object Object],Wifi,[object Object],Bluetooth,[object Object],Nordic Semiconductor proprietary chipset,[object Object],Camera,[object Object],Touch Screen,[object Object]
Operating System ,[object Object],iOS(previously iPhone OS) is currently at 4.3.3,[object Object],Darwin based kernel,[object Object],Unix platform,[object Object],Ships drivers for all hardware,[object Object],OS versions defines support for various features,[object Object],iOS 4 brought multitasking, Game Center,[object Object],iOS 3 brought video, improved GPS,[object Object],Security Mechanisms,[object Object],Code Signing,[object Object],Sandboxing,[object Object]
Programming on the iPhone,[object Object],Objective-C ,[object Object],A superset of the C language,[object Object],Uses an Object oriented model,[object Object],Uses messages instead of calls,[object Object],Uses late runtime binding of objects,[object Object],Cocoa,[object Object],Appkit,[object Object],Graphics that fit UI guidelines,[object Object],FoundationKit,[object Object],Containers,[object Object],Value manipulation,[object Object]
iPhone Binary Format,[object Object],Uses MACH-O format,[object Object],Comprised of,[object Object],a standard header,[object Object],a series of load commands,[object Object],a series of segments,[object Object],Sections within the segments,[object Object],The process of loading is,[object Object],Loader recognizes header,[object Object],Processes each load command,[object Object],Expands each segment,[object Object],Maps each section to memory,[object Object],Universal Binaries pair multiple platforms in one package,[object Object],iPhone binaries often have both ARM 6 and ARM 7,[object Object]
Examining a Binary,[object Object],Key Steps to Disassemble an iPhone Binary,[object Object],Get the Binary,[object Object],Put it on the phone,[object Object],Decrypt the segments,[object Object],Transfer it off the phone,[object Object],Load it in your Disassembler,[object Object],PROFIT!,[object Object]
Getting the Binary,[object Object],You can get the binary in a number of ways,[object Object],Download via iTunes,[object Object],Use iPhone Store app on device,[object Object],iPhone Backup,[object Object],Find third party place (be careful),[object Object],Binary locations,[object Object],Itunes:  ,[object Object],My MusicTunesTunes Mediaobile Applications,[object Object],On Phone: ,[object Object],/Applications,[object Object],/private/var/mobile/Applications,[object Object]
Getting Files On and Off the Phone,[object Object],If you downloaded from the appstore, you can skip this step,[object Object],Itunes,[object Object],Do a simple sync,[object Object],Third party (and getting apps off the phone),[object Object],Use SCP or iPhone Browser,[object Object],Clutch puts binaries here,[object Object],/var/root/Documents/Cracked/,[object Object]
WinSCP Demo,[object Object],Demo 1,[object Object]
Installing From the Appstore,[object Object],Demo 2,[object Object]
Decrypt the segments,[object Object],Appstore iPhone binaries are encrypted and signed,[object Object],Tied to the phone it is to be installed on,[object Object],Code segments are encrypted, so look like gibberish,[object Object],We need a way to decrypt,[object Object],The hard way,[object Object],Calculate encryption offsets,[object Object],Run program with debugger,[object Object],Dump unecrypted memory segment,[object Object],Patch binary with unecrypted segment,[object Object],Update references to crypto,[object Object],The easy way,[object Object],Clutch ,[object Object]
Clutch Demo,[object Object],Demo 3,[object Object]
Load It into the Disassembler,[object Object],Unpack the clutch output ipa,[object Object],Ipa files are just zip files, you can rename them to .zip ,[object Object],Should have a directory structure,[object Object],/some GUID,[object Object],/App files,[object Object],App is probably the largest file, has no extension,[object Object],Explore other files,[object Object],Use plist editor to examine .plist files,[object Object],DB/data files often SQLLite,[object Object],Load File into the Disassembler,[object Object]
Unpacking the IPA,[object Object],Demo 4,[object Object]
iPhone Binary Internals,[object Object],Uses Objective-C and Cocoa,[object Object],Calls are non-obvious,[object Object],Use python tool to fixup calls,[object Object],Reanalyze with new markup,[object Object],Code is ARM assembler,[object Object],Areas to look at,[object Object],Strings,[object Object],Areas of import,[object Object],Network calls,[object Object],Crypto,[object Object],Calls to key iPhone areas (mail, sms, calendar, etc),[object Object],Key functionality per app,[object Object],Graphs help understand flow,[object Object]
Analyzing the Binary,[object Object],Demo 5,[object Object]
Questions?,[object Object],Ryan_Permeh@mcafee.com,[object Object],http://www.mcafee.com,[object Object]

Más contenido relacionado

Destacado

iOS App Reverse Engineering
iOS App Reverse EngineeringiOS App Reverse Engineering
iOS App Reverse EngineeringZishe Sha
 
Understanding the Dalvik bytecode with the Dedexer tool
Understanding the Dalvik bytecode with the Dedexer toolUnderstanding the Dalvik bytecode with the Dedexer tool
Understanding the Dalvik bytecode with the Dedexer toolGabor Paller
 
Elementary µprocessor tutorial
Elementary µprocessor tutorial Elementary µprocessor tutorial
Elementary µprocessor tutorial Nabil Chouba
 
iOS Application Penetation Test
iOS Application Penetation TestiOS Application Penetation Test
iOS Application Penetation TestJongWon Kim
 
A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”
A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”
A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”Edmund Chattoe-Brown
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Dasnullowaspmumbai
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineeringParminder Singh
 
8 bit single cycle processor
8 bit single cycle processor8 bit single cycle processor
8 bit single cycle processorDhaval Kaneria
 
型態與運算子
型態與運算子型態與運算子
型態與運算子Justin Lin
 
Total Quality Management and i phone
Total Quality Management and i phoneTotal Quality Management and i phone
Total Quality Management and i phoneJawad Ali
 
MakerBoard: MT7688 Emulator
MakerBoard: MT7688 EmulatorMakerBoard: MT7688 Emulator
MakerBoard: MT7688 EmulatorFred Chien
 
Introduction to Reverse Engineering
Introduction to Reverse EngineeringIntroduction to Reverse Engineering
Introduction to Reverse EngineeringGopinath Chintala
 
Reverse Engineering (EVO 2008)
Reverse Engineering (EVO 2008)Reverse Engineering (EVO 2008)
Reverse Engineering (EVO 2008)Tudor Girba
 
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...Yole Developpement
 
Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)varun teja G.V.V
 
Reverse engineering
Reverse  engineeringReverse  engineering
Reverse engineeringYuffie Valen
 
Introduction to Operations and Supply Chain Management
Introduction to Operations and Supply Chain ManagementIntroduction to Operations and Supply Chain Management
Introduction to Operations and Supply Chain ManagementDr. Prashant Kalaskar
 

Destacado (20)

iOS App Reverse Engineering
iOS App Reverse EngineeringiOS App Reverse Engineering
iOS App Reverse Engineering
 
Understanding the Dalvik bytecode with the Dedexer tool
Understanding the Dalvik bytecode with the Dedexer toolUnderstanding the Dalvik bytecode with the Dedexer tool
Understanding the Dalvik bytecode with the Dedexer tool
 
Elementary µprocessor tutorial
Elementary µprocessor tutorial Elementary µprocessor tutorial
Elementary µprocessor tutorial
 
iOS Application Penetation Test
iOS Application Penetation TestiOS Application Penetation Test
iOS Application Penetation Test
 
A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”
A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”
A New Approach to Social Mobility Models: Simulation as “Reverse Engineering”
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineering
 
8 Bit A L U
8 Bit  A L U8 Bit  A L U
8 Bit A L U
 
8 bit single cycle processor
8 bit single cycle processor8 bit single cycle processor
8 bit single cycle processor
 
型態與運算子
型態與運算子型態與運算子
型態與運算子
 
Total Quality Management and i phone
Total Quality Management and i phoneTotal Quality Management and i phone
Total Quality Management and i phone
 
Innovation Secrets of Steve Jobs
Innovation Secrets of Steve JobsInnovation Secrets of Steve Jobs
Innovation Secrets of Steve Jobs
 
MakerBoard: MT7688 Emulator
MakerBoard: MT7688 EmulatorMakerBoard: MT7688 Emulator
MakerBoard: MT7688 Emulator
 
Introduction to Reverse Engineering
Introduction to Reverse EngineeringIntroduction to Reverse Engineering
Introduction to Reverse Engineering
 
Reverse Engineering (EVO 2008)
Reverse Engineering (EVO 2008)Reverse Engineering (EVO 2008)
Reverse Engineering (EVO 2008)
 
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
 
Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)Mi 291 chapter 3 (reverse engineering)(1)
Mi 291 chapter 3 (reverse engineering)(1)
 
Reverse engineering
Reverse  engineeringReverse  engineering
Reverse engineering
 
Introduction to Operations and Supply Chain Management
Introduction to Operations and Supply Chain ManagementIntroduction to Operations and Supply Chain Management
Introduction to Operations and Supply Chain Management
 
Ios vs android
Ios vs androidIos vs android
Ios vs android
 

Más de Source Conference

iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsSource Conference
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesSource Conference
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecuritySource Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration TestersSource Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSource Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSource Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItSource Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of AnonymousSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary plantingSource Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendSource Conference
 

Más de Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 

Último

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Último (20)

Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Slicing into Apple: iPhone Reverse Engineering

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.