Navan
Navan is a person of far too many varied interests. He likes to say that, at the end of the day, what matters most to him is how fun and challenging the problem is—not whether he has any prior experience—because you can always learn more (that’s the engineering god complex in him speaking). He has wasted an impressive amount of time working with Python, Swift, shell scripts, and OpenWRT. When not attempting to watch the entirety of Doctor Who in one sitting, Navan can be found in the great outdoors in his crocs, trying to come up with imaginative ways to get injured.
Session
iOS reverse engineering can seem daunting – where do you even begin? With jailbreaking iOS becoming increasingly difficult each year, you can no longer simply attach a debugger to your phone and analyse an app’s behaviour as you once could. However, new tools and frameworks have emerged that make it possible to modify apps without a jailbreak. This talk is designed as a practical guide from zero to hero, using the YouTube app as a case study – specifically, modding it to remove short-form content.
We’ll cover the history of iOS reverse engineering and tweak development, iOS app packaging, dynamic analysis, method swizzling, and in-app debugging. Plus, with the advent of Apple Silicon Macs, you don’t even need an iPhone to start reverse-engineering iOS apps.