SlideShare ist ein Scribd-Unternehmen logo
1 von 67
Downloaden Sie, um offline zu lesen
www.securing.pl
Wojciech Reguła
Building&Hacking
modern iOS apps
@_r3ggi
wojciech.regula@securing.pl
www.securing.plwww.securing.pl
WHOAMI
-Senior IT Security Consultant @ SecuRing
-Focused on iOS apps security
-Blogger https://wojciechregula.blog/
-OWASP SKF contributor
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
INTRODUCTION
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
AGENDA
1. iOS platform myths and reality
2. securityProblemsInMASVSCategories.forEach { problem in
2.1 Discuss problem
2.2 Show solution
2.3 Present new Apple WWDC feature
}
3. My new library – iOS Security Suite 🚀
4. Short and long term things to implement in your code
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
PART I
PLATFORM MYTHS AND REALITY
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH #1 APPLE’S
REVIEW IS 100% RELIABLE
https://twitter.com/orhaneee/status/1076147994574184449
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH #2 THERE IS NO JAILBREAK
FOR IOS 11+
https://github.com/pwn20wndstuff/Undecimus
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH #3 NO JAILBREAK
MEANS NO REVERSING APPS
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
PART II
SECURE DEVELOPMENT
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V1 ARCHITECTURE
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
SWIFT VS OBJECTIVE-C
-Integer overflow -> Runtime error
-No direct memory access (unless
usage of UnsafePointer)
-Format string mitigated through
string interpolation
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH – SWIFT AUTOOBFUSCATES
ITSELF
-There is no obfuscation
-Swift uses ”name mangling”
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH – SWIFT
AUTOOBFUSCATES
ITSELF
-Class TestClass
-1 Instance variable
-Constructor
-2 Methods
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH – SWIFT
AUTOOBFUSCATES
ITSELF
- _$ Swift Symbol
- Length and module name
- Length and class name
- C function of class (method)
- Length and method name
- Parameters and return type
www.securing.plwww.securing.pl
MYTH – SWIFT
AUTOOBFUSCATES
ITSELF
- _$ Swift Symbol
- Length and module name
- Length and class name
- C function of class (method)
- Length and method name
- Parameters and return type
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH – SWIFT METHODS CANNOT
BE DYNAMICALLY CHANGED
-They can, using for example Frida
-You just need to hook the symbol
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MYTH – SWIFT METHODS CANNOT
BE DYNAMICALLY CHANGED
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
DEMO
HTTPS://VIMEO.COM/334861122
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
TAKEAWAYS
-Binary vulnerabilities mitigated
-Mostly no memory access
-Obufscation ⬇
https://github.com/rockbruno/swiftshield
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
AUTOMATED SMS CODES INPUT
(WWDC 2018)
-Controversial feature since
other app may have access
to the one time password
-Low risk but there is
possibility to do social
engineering
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
DEMO
HTTPS://VIMEO.COM/334861389
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V2 DATA STORAGE
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
ON-DEVICE DATA STORAGE
-Most common issue is storing sensitive data on the
device that should not be there:
• API Keys
• SSH Keys
• Cloud credentials
• Test env credentials
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
ON-DEVICE DATA STORAGE
-Sensitive data may be insecurely stored in:
•Info.plist
•User defaults
•Regular files
•Hardcoded into the binary
•Even in Keychain (as they shouldn’t be
stored client-side)
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
ON-DEVICE DATA STORAGE
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
ON-DEVICE DATA STORAGE
-Directories that are backed up:
• Documents/
• Library/Application Support/
• Library/Preferences/
• Library/*
-Directories not backed up:
• Library/Caches/
• tmp/
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
CREDENTIAL PROVIDER
EXTENSION (WWDC 2018)
-Password managers in native apps
-Add UITextContentType
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
TAKEAWAYS
-No sensitive data in IPA
-kSecAttrAccessibleWhen with
ThisDeviceOnly
-UIKit DataProtection
-Credential Providers
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V3 CRYPTOGRAPHY
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
CRYPTOGRAPHY
- Insecure token generation
- Bear case
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
https://wojciechregula.blog/post/stealing-bear-notes-with-url-schemes/
www.securing.plwww.securing.pl
AUTOMATIC STRONG PASSWORDS
(WWDC 2018)
- Mentioned before Autofill can create new passwords
connected with your domain
- You are able to set the password policy that will be applied
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
TAKEAWAYS
-No home-made ciphers
-Everything in IPA is public
-SecKeyCreateEncryptedData
instead of 3rd party AES/RSA
-Native password policy
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V4 SESSION
MANAGEMENT
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
SESSION MANAGEMENT
-Local access control…
-JWT -> sign the token!
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V5 NETWORK
COMMUNICATION
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
NETWORK COMMUNICATION
-Avoid HTTP
-Use HTTPS ✅
-App Transport Security
-HTTPS -> make sure if
cert is trusted
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V6 PLATFORM
INTERACTION
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
INTER-PROCESS (APPLICATION)
COMMUNICATION
-XPC (macOS, iOS not allowed)
-Mach messages (macOS, iOS not allowed)
-URL Schemes
-AirDrop
-Clipboard (please, do not do that)
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
TAKEAWAYS
-Verify sender
-Check parameters
-If WebView -> check
permissions
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V7 CODE QUALITY
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
CODE QUALITY
-No deprecated APIs
-Vulnerable libraries
-CocoaPods/Carthage -> no
fixed versions please
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
AFNetworking 2.5.1
allowed to perform
Man in the Middle
attack when app did
not use SSL pinning
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
DEPRECATED UIWEBVIEW
(WWDC 2018)
-UIWebView has access to local files via file://
handler BY DEFAULT
-WKWebView also has if you turn some flags on
btw
-XSS ☠
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
DICTIONARY THAT LOOKS
YOU UP
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
DEMO
HTTPS://VIMEO.COM/334862417
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
HELP VIEWER PROBLEMS
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
DEMO
HTTPS://VIMEO.COM/334861507
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
YAHOO IOS XSS EXAMPLE BY @OMESPINO
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
V8 RESILIENCY
REQUIREMENTS
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
ANTI TAMPERING
For those who:
• Don’t want their app to be
tampered with
• Consider malware as a risk
• Have to be complaint with
OWASP MASVS
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
IOS SECURITY SUITE V1.0 LIBRARY
-What it detects:
• Jailbreaks with new
indicators
• Attached debuggers
• Tampering tools (e.g. Frida)
• If your app is run in
emulator
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl@_r3ggi wojciech.regula@securing.pl
IOS
SECURITY
SUITE
V1.0
LIBRARY
h"ps://github.com/securing/IOSSecuritySuite
www.securing.plwww.securing.pl
PART III
SUMMARY
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
COMMON VULNERABILTIES SUMMARY
-Backed up sensitive data
-Keys/accounts in IPA
-Network issues
-Vulnerable URL schemes
-Fixed lib versions
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
RECOMMENDATIONS
-Short term
• Password managers & autofill
• Anti-tampering for high-risk apps
-Long term
• WKWebView
• Native password policy
• Swift > Objective-C
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
Security Aware
Developers
Pentesters
SECURITY ISSUES
@_r3ggi wojciech.regula@securing.pl
www.securing.plwww.securing.pl
MOBILE
APPLICATION
SECURITY
BEST
PRACTICES
https://www.securing.biz/en/mobile-application-security-best-practices/index.html
@_r3ggi wojciech.regula@securing.pl
www.securing.pl
SecuRing
Kalwaryjska 65/6
30-504 Kraków, Poland
info@securing.pl
tel. +48 124252575
http://www.securing.biz/en
Contact
Wojciech Reguła
wojciech.regula@securing.pl
@_r3ggi
wojciech-regula

Weitere ähnliche Inhalte

Was ist angesagt?

Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Stanfy
 
Building Encrypted APIs with HTTPS and Paillier
Building Encrypted APIs with HTTPS and PaillierBuilding Encrypted APIs with HTTPS and Paillier
Building Encrypted APIs with HTTPS and PaillierNicholas Doiron
 
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chainPLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chainPROIDEA
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera SoftwareOWASP
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsSecuRing
 
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSAnant Shrivastava
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL AttacksAkash Mahajan
 
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...CODE BLUE
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksGreg Foss
 
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learnedTale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learnedAnant Shrivastava
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
 
Developer's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyDeveloper's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyKevin Hakanson
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2drewz lin
 
JHipster and Okta - JHipster Virtual Meetup December 2020
JHipster and Okta - JHipster Virtual Meetup December 2020JHipster and Okta - JHipster Virtual Meetup December 2020
JHipster and Okta - JHipster Virtual Meetup December 2020Matt Raible
 
CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014Greg Foss
 
Cryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptCryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptbarysteyn
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsLuca Bongiorni
 
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...Matt Raible
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestSecuRing
 
Getting Single Page Application Security Right
Getting Single Page Application Security RightGetting Single Page Application Security Right
Getting Single Page Application Security RightPhilippe De Ryck
 

Was ist angesagt? (20)

Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
 
Building Encrypted APIs with HTTPS and Paillier
Building Encrypted APIs with HTTPS and PaillierBuilding Encrypted APIs with HTTPS and Paillier
Building Encrypted APIs with HTTPS and Paillier
 
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chainPLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain
PLNOG23 - Paweł Rzepa - Attacking AWS: the full cyber kill chain
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
 
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learnedTale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Developer's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyDeveloper's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web Cryptography
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
 
JHipster and Okta - JHipster Virtual Meetup December 2020
JHipster and Okta - JHipster Virtual Meetup December 2020JHipster and Okta - JHipster Virtual Meetup December 2020
JHipster and Okta - JHipster Virtual Meetup December 2020
 
CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014CMS Hacking Tricks - DerbyCon 4 - 2014
CMS Hacking Tricks - DerbyCon 4 - 2014
 
Cryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptCryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScript
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
Getting Single Page Application Security Right
Getting Single Page Application Security RightGetting Single Page Application Security Right
Getting Single Page Application Security Right
 

Ähnlich wie Building&Hacking modern iOS apps

Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Codemotion
 
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!SecuRing
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 
You Spent All That Money And Still Got Owned
You Spent All That Money And Still Got OwnedYou Spent All That Money And Still Got Owned
You Spent All That Money And Still Got OwnedJoe McCray
 
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...Positive Hack Days
 
Easy logins for Ruby web applications
Easy logins for Ruby web applicationsEasy logins for Ruby web applications
Easy logins for Ruby web applicationsFrancois Marier
 
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?Scott Carlson
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From HacksTony Perez
 
Drupal Security Seminar
Drupal Security SeminarDrupal Security Seminar
Drupal Security SeminarCalibrate
 
Painless Mobile App Development Webinar
Painless Mobile App Development WebinarPainless Mobile App Development Webinar
Painless Mobile App Development WebinarSalesforce Developers
 
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...PROIDEA
 
Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...
Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...
Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...mdevtalk
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Barry Dorrans
 

Ähnlich wie Building&Hacking modern iOS apps (20)

Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...Secure Coding principles by example: Build Security In from the start - Carlo...
Secure Coding principles by example: Build Security In from the start - Carlo...
 
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
You Spent All That Money And Still Got Owned
You Spent All That Money And Still Got OwnedYou Spent All That Money And Still Got Owned
You Spent All That Money And Still Got Owned
 
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
 
Easy logins for Ruby web applications
Easy logins for Ruby web applicationsEasy logins for Ruby web applications
Easy logins for Ruby web applications
 
Cqcon2015
Cqcon2015Cqcon2015
Cqcon2015
 
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
Drupal Security Seminar
Drupal Security SeminarDrupal Security Seminar
Drupal Security Seminar
 
Painless Mobile App Development Webinar
Painless Mobile App Development WebinarPainless Mobile App Development Webinar
Painless Mobile App Development Webinar
 
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
 
Delhi The Second Adventure
Delhi The Second AdventureDelhi The Second Adventure
Delhi The Second Adventure
 
Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...
Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...
Anastasiia Vixentael: 10 things you need to know before implementing cryptogr...
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10
 

Mehr von SecuRing

Developer in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersDeveloper in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersSecuRing
 
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!SecuRing
 
Developer in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameDeveloper in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameSecuRing
 
Is persistency on serverless even possible?!
Is persistency on serverless even possible?!Is persistency on serverless even possible?!
Is persistency on serverless even possible?!SecuRing
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS EnvironmentsSecuRing
 
Developer in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionDeveloper in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionSecuRing
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy MechanismsSecuRing
 
How secure are webinar platforms?
How secure are webinar platforms?How secure are webinar platforms?
How secure are webinar platforms?SecuRing
 
Serverless security: attack & defense
 Serverless security: attack & defense Serverless security: attack & defense
Serverless security: attack & defenseSecuRing
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleSecuRing
 
Budowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSBudowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSSecuRing
 
We need t go deeper - Testing inception apps.
We need t go deeper - Testing inception apps.We need t go deeper - Testing inception apps.
We need t go deeper - Testing inception apps.SecuRing
 
Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?SecuRing
 
Czy S w PSD2 znaczy Secure?
Czy S w PSD2 znaczy Secure?Czy S w PSD2 znaczy Secure?
Czy S w PSD2 znaczy Secure?SecuRing
 
Testowanie bezpieczeństwa chmury na przykładzie AWS.
Testowanie bezpieczeństwa chmury na przykładzie AWS.Testowanie bezpieczeństwa chmury na przykładzie AWS.
Testowanie bezpieczeństwa chmury na przykładzie AWS.SecuRing
 
Internet banking applications' security
Internet banking applications' securityInternet banking applications' security
Internet banking applications' securitySecuRing
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...SecuRing
 
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOS
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOSJailbreak - dylematy hazardzisty w pentestach aplikacji iOS
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOSSecuRing
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCSecuRing
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestSecuRing
 

Mehr von SecuRing (20)

Developer in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersDeveloper in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4Developers
 
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
 
Developer in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameDeveloper in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON Name
 
Is persistency on serverless even possible?!
Is persistency on serverless even possible?!Is persistency on serverless even possible?!
Is persistency on serverless even possible?!
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments
 
Developer in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionDeveloper in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 edition
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms
 
How secure are webinar platforms?
How secure are webinar platforms?How secure are webinar platforms?
How secure are webinar platforms?
 
Serverless security: attack & defense
 Serverless security: attack & defense Serverless security: attack & defense
Serverless security: attack & defense
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scale
 
Budowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSBudowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOS
 
We need t go deeper - Testing inception apps.
We need t go deeper - Testing inception apps.We need t go deeper - Testing inception apps.
We need t go deeper - Testing inception apps.
 
Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?
 
Czy S w PSD2 znaczy Secure?
Czy S w PSD2 znaczy Secure?Czy S w PSD2 znaczy Secure?
Czy S w PSD2 znaczy Secure?
 
Testowanie bezpieczeństwa chmury na przykładzie AWS.
Testowanie bezpieczeństwa chmury na przykładzie AWS.Testowanie bezpieczeństwa chmury na przykładzie AWS.
Testowanie bezpieczeństwa chmury na przykładzie AWS.
 
Internet banking applications' security
Internet banking applications' securityInternet banking applications' security
Internet banking applications' security
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
 
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOS
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOSJailbreak - dylematy hazardzisty w pentestach aplikacji iOS
Jailbreak - dylematy hazardzisty w pentestach aplikacji iOS
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 

Kürzlich hochgeladen

Satara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort serviceSatara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort serviceMumbai Call girl
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...Sheetaleventcompany
 
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNURKANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNURSapna Call girl
 
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfCall Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfsoniya singh
 
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...Apsara Of India
 
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...Sheetaleventcompany
 
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE in darjiling Book...
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE in darjiling Book...darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE in darjiling Book...
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE in darjiling Book...Monika Rani
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...Cara Menggugurkan Kandungan 087776558899
 
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...Sheetaleventcompany
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...deepak38245
 
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book nowapshanarani255
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Apsara Of India
 
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book nowJamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book nowapshanarani255
 
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALAAMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALASapna Call girl
 
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...Sheetaleventcompany
 
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEMORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICESapna Call girl
 
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127kushalpasi01
 
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call GirlsMainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call GirlsNitya salvi
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...rajbaburaj201
 
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICEBHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICENiteshKumar82226
 

Kürzlich hochgeladen (20)

Satara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort serviceSatara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort service
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
 
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNURKANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
KANNUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE KANNUR
 
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfCall Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
 
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Best Genuine Call Girl in Udaipur Escort Ser...
 
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
 
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE in darjiling Book...
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE in darjiling Book...darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE in darjiling Book...
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE in darjiling Book...
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
 
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
 
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
 
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book nowJamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
 
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALAAMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
 
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
 
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEMORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
 
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
 
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call GirlsMainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
 
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICEBHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
 

Building&Hacking modern iOS apps