January 2016
Beginner
204 pages
3h 54m
English
We have studied two things: getting shell access using different payloads as a bind shell, reverse bind shell, and persistent shell access on iDevice, and using iDevice to get shell of other systems.
In the next chapter, we'll study the basics of iOS forensics.
Read now
Unlock full access