iPhone Hacking: Command and Control with the Empire Framework

December 13, 2021
iPhone Hacking: Command and Control with the Empire Framework

In my last iPhone video, we looked at how we can get a reverse shell from the iSH app on iPhone. This limited us to the Linux environment that the iSH app gives you. Today, let’s see how we can establish command and control over the iPhone itself!

Related Resources

Predicting Malicious Network Connections Using Splunk and AI

See how Splunk can be used to predict malicious network connections using artificial intelligence and machine learning!

Splunk and AI, Part 2 – Threat Hunting on Domain Controllers Using Deep Learning

See how machine learning and artificial intelligence can be used within Splunk to find anomalies on domain controllers

Splunk and AI, Part 1- Automating Threat Hunting With Artificial Intelligence

See how artificial intelligence can be used within Splunk to bring possible security anomalies to light.