This document provides an overview of iOS application penetration testing for beginners. It covers setting up a pen testing environment, understanding the iOS filesystem and Objective-C runtime, techniques for runtime analysis and manipulation, insecure data storage, side channel data leakage, analyzing URL schemes and network traffic, and secure coding guidelines. The agenda includes jailbreaking a device, installing useful tools like Cycript and class-dump, understanding the application sandbox and filesystem structure, runtime concepts in Objective-C, manipulating running applications using Cycript, insecure storage techniques like plist and NSUserDefaults, side channels like logs, snapshots and pasteboard, URL schemes, and analyzing network traffic using a proxy like Burp.