Practical iOS App, User, Kernel-Space and Firmware Reverse-Engineering (Online)

Training Overview

Practical iOS App, User-, Kernel-Space & Firmware Reverse-Engineering is a rigorous, four-day deep-dive training at CSA XCON 2026, designed to equip participants with hands-on skills to reverse engineer iOS applications, operating system internals, kernel components, and firmware.

This training bridges the gap between mobile app security, OS internals, and hardware-adjacent firmware analysis, taking students from foundational reverse-engineering concepts to advanced vulnerability discovery workflows used by professional researchers.

Whether you are starting your journey into iOS reverse engineering or looking to push into kernel-space, fuzzing, and firmware analysis, this training delivers a complete, structured path.

About the Training at CSA XCON 2026

This is a tool-driven, lab-intensive training, not a theory lecture.

Key highlights include:

Participants work with real iOS devices or controlled virtual environments, building skills progressively across four structured days.

What You Will Learn

iOS App Fundamentals

Learning Outcome: Perform static and dynamic reverse engineering of iOS apps and trace execution paths.

Topics include:

User-Space Internals, Threads & Fuzzing

Learning Outcome: Write basic fuzzers, analyze crashes, and understand asynchronous execution.

Topics include:

User-Space Meets Kernel-Space

Learning Outcome: Trace how apps interact with the kernel and drivers.

Topics include:

Firmware & Mobile Forensics

Learning Outcome: Begin firmware reverse engineering and identify indicators of compromise.

Topics include:

Training Experience & Expectations

Participants leave with the confidence to reverse engineer unknown iOS components on their own.

Key Takeaways

Who Should Attend

This training is ideal for:

Skill Level

Beginner to Intermediate

Participant Requirements

Participants should have:

What Participants Will Receive

Each participant will receive: