• XSS.stack #1 – первый литературный журнал от юзеров форума

Searching for pirated iOS Reversing & Exploitation ARM64 course from Xintra

Пожалуйста, обратите внимание, что пользователь заблокирован
I have not seen this course in the public. There is little point in this course to buy it. All you need is a macbook and an iphone with jailbreak installed on it. Next you will need to deploy an ssh server and client to connect to the device. After that you can start studying user-mode exploitation and then move on to kernel-mode. All this information is publicly available and I think it's stupid to pay for it. You can easily find everything yourself, you just need to set up a working environment, it is desirable that you have not one iPhone, but a couple more spare ones, since when you work with the kernel and ispw firmware there is a chance to turn the device into a brick, this is normal practice for apple researchers. But if the course does appear in the public, we will definitely add it to this topic. It certainly won't be superfluous.
 
OSX isnt my AOE. But:
At least 2 devices: 1 daily driver on stock iOS, 1 sacrificial chassis on a lifetime checkm8‑able version (A11 or older).
usbc to uart dongle: cheap insurance, a full DFU restore sometimes needs serial to see where it hangs.

PS. Whatever you do, don't skip ARM asm: you can copypasta Frida hooks all day, but the moment you need to pivot the stack / craft a PACsafe ROP chain you’ll stall.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
If I wanted to learn iOS exploits. I'd buy as many iPhones as possible. Ideally, of course, to get access to corellium. To study even old vulnerabilities and techniques. To even try to reproduce old exploits. And to make it even more interesting, I'd try chaining them together for the Safari browser (install JavaScriptCore). There's really a lot of information on the web on any topic you're interested in. The problem of all beginners is that they don't quite realize that everything is already available on the Internet for free, you don't even have to look for courses.
 
If you have time and interest, create a new topic and present the learning path in it.The purpose of a path is to list vulnerabilities with their write-ups so that we can move forward step by step. Things that will be useful in 2025-2026. This path should include both techniques and things needed to learn these techniques. Definitely not 100%.Of course, they don't need management, because there are write-ups and there is artificial intelligence.Of course, I am interested in Windows. ;)
 
Пожалуйста, обратите внимание, что пользователь заблокирован
I am interested in Windows. ;)
In case of studying Windows exploitation everything is simpler, there is a whole bunch of free materials. A lot of things were published in the section. You just need to look through the section.
 
In case of studying Windows exploitation everything is simpler, there is a whole bunch of free materials. A lot of things were published in the section. You just need to look through the section.
Yes. But one doesn't know exactly where to read and where not to. Techniques become obsolete and... .
 
Последнее редактирование модератором:
I hope I am writing in the right thread,

Im looking for particular course, official link: https://www.xintra.org/training/course/2-ios-reversing-exploitation-arm64

If someone has it and is willing to share, I would appreciate it.
Bro start making something yourself learn C + mach api, then objective-c these programming languages are needed for exploitation, read Levin. Buy a device, make jailbreak, start solving small simple tasks to get used to the architecture, then write solutions for them. There is no magic pill in this business. The courses are confused about arm assembler, learn it I can recommend Azeria labs. Then move on to real vulnerabilities make patch diffing for old vulnerabilities and then write exploits yourself. Only your desire is needed.
 
Последнее редактирование:


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх