Description: This video is part of the SecurityTube GNU Debugger Expert course and certification! You can begin watching the first part here: http://www.securitytube.net/video/5654
In this video, we will take an iPhone application (GUI based) which has jailbreak detection built into it using the fileExistsAtPath technique. We will see how we can use class-dump-z to get the application's class information, then set appropriate breakpoints in GDB. Once this is done we can either locate the place where the check for Jailbreaking is happening or the place where the result of this check is being used. In each of the above, we can change the course of the program by changing the program state dynamically. If you've ever wondered how low level manipulation is done on iOS, this video will be very informational!
PDF AND CODE DOWNLOADS: http://www.securitytube.net/sgde?id=13
Tags: sgde , gnu debugger , gdb , ios , iphone , cracking , reversing , arm ,
Thanks a lot Vivek :)