65e994de6300b4ab4c5f893cd27456f7

Abstract

This talk would be demonstrating how to perform dynamic analysis on flutter-based (proxy unaware) iOS applications by reversing the binary via Ghidra. It would also demonstrate how to use Frida to bypass SSL Pinning on such applications by writing a custom Frida Script.

Speaker

Ali Jujara

Timing

Starts at Saturday June 18 2022, 12:30 PM. The sessions runs for about 1 hour.

Resources