Practical iOS App, User-, Kernel-Space & Firmware Reverse-Engineering is a rigorous, four-day deep-dive training at CSA XCON 2026, designed to equip participants with hands-on skills to reverse engineer iOS applications, operating system internals, kernel components, and firmware.
This training bridges the gap between mobile app security, OS internals, and hardware-adjacent firmware analysis, taking students from foundational reverse-engineering concepts to advanced vulnerability discovery workflows used by professional researchers.
Whether you are starting your journey into iOS reverse engineering or looking to push into kernel-space, fuzzing, and firmware analysis, this training delivers a complete, structured path.
This is a tool-driven, lab-intensive training, not a theory lecture.
Key highlights include:
Participants work with real iOS devices or controlled virtual environments, building skills progressively across four structured days.
Learning Outcome: Perform static and dynamic reverse engineering of iOS apps and trace execution paths.
Topics include:
Learning Outcome: Write basic fuzzers, analyze crashes, and understand asynchronous execution.
Topics include:
Learning Outcome: Trace how apps interact with the kernel and drivers.
Topics include:
Learning Outcome: Begin firmware reverse engineering and identify indicators of compromise.
Topics include:
Participants leave with the confidence to reverse engineer unknown iOS components on their own.
This training is ideal for:
Beginner to Intermediate
Participants should have:
Each participant will receive: