iOS Reverse Engineering with Frida

iOS Reverse Engineering with Frida

Learn how to use Frida as an essential tool in iOS reverse engineering.

rate limit

Code not recognized.

About this course

Frida is an open-source dynamic instrumentation toolkit used in reverse engineering. It allows you to observe and manipulate software while running on a device. One of the most common use cases of Frida includes bypassing in-app protections like certificate pinning.

Watch Christine Fossaceca discuss how to use Frida in iOS reverse engineering during the Objective by the Sea, v4.0 conference. You'll learn how to get started with Frida, set it up for iOS, demos and tips.

Tools and software used in this demo:

  • iPhone 7 running on iOS 14.7.1
  • checkra1n jailbreak
  • Frida 15 (v15.1.1) on MacOS

Duration: ~45 min

Curriculum43 min

  • iOS Reverse Engineering with Frida 43 min
  • Resources
  • Course Feedback

About this course

Frida is an open-source dynamic instrumentation toolkit used in reverse engineering. It allows you to observe and manipulate software while running on a device. One of the most common use cases of Frida includes bypassing in-app protections like certificate pinning.

Watch Christine Fossaceca discuss how to use Frida in iOS reverse engineering during the Objective by the Sea, v4.0 conference. You'll learn how to get started with Frida, set it up for iOS, demos and tips.

Tools and software used in this demo:

  • iPhone 7 running on iOS 14.7.1
  • checkra1n jailbreak
  • Frida 15 (v15.1.1) on MacOS

Duration: ~45 min

Curriculum43 min

  • iOS Reverse Engineering with Frida 43 min
  • Resources
  • Course Feedback

Click here to read NowSecure's Terms and Conditions.

×