This course is an intensive hands-on program designed to teach reverse engineering, vulnerability discovery, and exploit development on iOS devices running ARM64 architecture. It begins by establishing a foundation in ARM64 assembly, iOS security model, sandboxing mechanisms, and kernel internals, gaining insight into how Apple hardens its operating system and how attackers circumvent those protections. Throughout the course, students learn to reverse and patch iOS binaries, analyze IPA files, and bypass anti-debugging measures. The curriculum dives deep into the mechanics of memory corruption, covering stack overflows, integer overflows, heap spraying, and use-after-free exploitation. These concepts are reinforced through guided labs that replicate real-world vulnerabilities such as CVE-2021-30807 and CVE-2021-30860, culminating in the construction of ROP and JOP chains on iOS targets.
Check back later or contact us.