iOS Hacking - App Transport Basics

A critical part of every mobile hacker’s process is determining what network APIs and endpoints the application uses. In the fourth module of our iOS application hacking series, you’ll learn how to configure your iOS device to send traffic to a proxy for further analysis - even when the application uses certificate pinning. We’ll also review the minimum standards enforced by iOS for transport security and how applications can bypass those built-in protections.


Previous video Next video