У нас вы можете посмотреть бесплатно iOS 8kSec Challenge3: TraceTheMaps или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this new episode of the 8kSec Challenge series, we take on the notorious 'TraceTheMaps' challenge, focusing on advanced iOS reverse engineering. This challenge is all about bypassing deep-seated GPS spoofing and location verification checks on an iOS application. Watch the full walkthrough as I use IDA Pro to analyze the Objective-C runtime, identify the critical location verification points, and ultimately develop a sophisticated *Frida instrumentation script* to achieve a clean location bypass. Learn how to defeat custom security checks in mobile applications! *Video Chapters for the TraceTheMaps Challenge:* 0:00 - Introduction to the iOS 8kSec Challenge 3 1:48 - Validating the GPS Spoofing Failure and Initial Analysis 5:00 - Deep Dive: IDA Pro Disassembly and Objective-C Runtime Analysis 33:45 - Developing and Applying the Location Bypass Frida Hook 41:10 - Final Thoughts and Solution If you're interested in mobile security, reverse engineering, or penetration testing on iOS, make sure to like and subscribe for more technical breakdowns. Connect with us on: X: @SecFatal Telegram: https://t.me/SecFatal Mail: [secfatal@proton.me](mailto:secfatal@proton.me) You can also support us by buying a cup of coffee: [buymeacoffee.com/secfatalz](http://buymeacoffee.com/secfatalz)