SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
iOS Application Security And Static
Analysis
Application security refers to the strategies used to protect mobile
applications, online apps, and APIs (Application Programming
Interfaces) from hackers. In the mobile device market, iOS is the most
popular operating system. Because of their popularity, a variety of
apps have been developed, making them excellent targets for
attackers.
Today, we’ll look at how to perform static security pentesting on iOS
apps, starting with bypassing SSL pinning and a few potential security
flaws.
Bypassing SSL Pinning on iOS Device
The technique of linking a host with its certificate/public key is
known as SSL Certificate Pinning. You pin a certificate or public key
to a host after you have it. In other words, you set the app to refuse
any certificates or public keys save one or a few predetermined ones.
Bypassing SSL Pinning using Frida :-
Frida:- Frida is a Dynamic instrumentation toolkit for developers,
reverse-engineers, and security researchers that allows you to inject
JavaScript snippets or your own libraries into native Windows,
macOS, iOS, Android, and QNX programmes.
Install Frida from Github :- https://github.com/frida/frida
Install Frida on your Jailbroken iOS Device also through Cydia.
Step 1:- Run command frida-ps -Uia to list all the running app’s on the
device.
Great. That is all the info you require.
Step 2:- Now Run the command frida–codeshare
federicodotta/ios13-pinning-bypass -f -U –no-pause.
Here, Identifier is the bundle id of the application for which you want
to bypass SSL Pinning. So to get the identifier run the command in
step 1 .
Step 3:- After the process is completed successfully. Configure your
iOS device with burp suite and try to intercept the traffic of the app
for which you bypassed SSL Pinning.
Below is the example of amazon application:-
Extracting the ipa file from any iOS Device
You can use Imazing to extract the ipa file of any application installed
on your iphone , whether your device is jailbroken or not.
Install the application in your iOS device now go to Imazing, connect
your device to your mac/windows and go to manage apps. There you
will see a list of all the applications installed on your device and in the
front of all app names you will see a download button as shown in the
image below. Now Click on that button and the ipa of that application
will be downloaded on your Pc.
MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one
mobile application (Android/iOS/Windows) pen-testing, malware
analysis and security assessment framework capable of performing
static and dynamic analysis.
Plist
Plist stands for Property List. It is a flexible and easy format for
storing application data. It’s what we’d refer to as an iOS app’s
manifest. Sometimes you can find sensitive data in these files like
Gmap api keys etc.
You can see Plist files in MobSf also or you can use the Objection
Framework command.
Objection Command → ios plist cat Info.plist
Keychain Dump
Keychain is a secure storage container on an iOS device that is used to
store sensitive information such as usernames, passwords, network
passwords, and auth tokens..It allows you to save account names,
passwords, and credit card data safely and securely.
Insecure Transport Layer ( App Transport Security )
If App Transport Security is disabled on the domain i.e :-
{‘NSAllowsArbitraryLoads’: True}’,While ATS safeguards are
maintained everywhere in your programme, disabling ATS might
allow unsafe contact with specific servers or unsecured loads for web
views or media.
NsUserdefault File
It is also a simple plist file in your app package which can be used to
set and get data very easily. Its structure resembles that of a
dictionary, and the user defaults are sometimes referred to as a
key-value store.
Hardcoded Api Keys
Most of the apps need private/sensitive values, such as secrets ,
passwords & Api Keys which are stored in the application’s source
code to setup third party SDKs or backend Api’s.
During the build process or while using developer tools, such as
interacting with an Apple Developer account, some secrets may be
required.
Binary Analysis using otool
You can use otool (object file displaying tool) for further binary
analysis of the application. The otool command displays sections of
object files or libraries that you specify. You can check using otool
that if the application is using weak hashing algorithms
,Banned/deprecated api’s, malloc function or insecure random number
generators.
Commands to check these are given below:-
To Check for weak hashing algorithms: –
● Open the terminal and take the ssh of your Iphone.
● Command:- ssh root@
● cd /var/containers/Bundle/Application//
● otool -Iv | grep -w _CC_MD5
● otool -Iv | grep -w _CC_SHA1
To Check for Banned/Deprecated Api’s :-
● Open the terminal and take the ssh of your Iphone.
● Command:- ssh root@<IP>
● cd /var/containers/Bundle/Application/<APP_ID>/<app>
● otool -Iv <app> | grep -w _stat
● otool -Iv <app> | grep -w _sscanf
● otool -Iv <app> | grep -w _strncpy
● otool -Iv <app> | grep -w _strle
Similarly is for malloc function and Insecure random number
generator.
Source Blog :-
https://detoxtechnologies.com/ios-application-security-overview/
IOS Static Analysis || IOS Application Security || IOS Application
Security Solutions || IOS Security Overview || IOS Application
Security Testing
Ad

Recommended

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Mobile security
Mobile security
CyberoamAcademy
 
Api Testing
Api Testing
Vishwanath KC
 
Android security
Android security
Mobile Rtpl
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
Ishrath Sultana
 
OWASP Top 10 API Security Risks
OWASP Top 10 API Security Risks
IndusfacePvtLtd
 
Api application programming interface
Api application programming interface
Mohit Bishnoi
 
Getting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
API Security Fundamentals
API Security Fundamentals
José Haro Peralta
 
Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface)
Vibhawa Nirmal
 
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
API Testing: The heart of functional testing" with Bj Rollison
API Testing: The heart of functional testing" with Bj Rollison
TEST Huddle
 
Mobile Device Security
Mobile Device Security
Nemwos
 
Android Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Test Automation Using Python | Edureka
Test Automation Using Python | Edureka
Edureka!
 
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
Matt Tesauro
 
Api testing
Api testing
HamzaMajid13
 
Port scanning
Port scanning
Hemanth Pasumarthi
 
industrial training report on Ethical hacking
industrial training report on Ethical hacking
Nitesh Dubey
 
Android Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Social engineering
Social engineering
Vishal Kumar
 
4 Mapping the Application
4 Mapping the Application
Sam Bowne
 
Honeypot Basics
Honeypot Basics
Manoj kumawat
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyber
Jahangirnagar University
 
Burpsuite 101
Burpsuite 101
n|u - The Open Security Community
 
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
Pentesting iPhone applications
Pentesting iPhone applications
Satish b
 

More Related Content

What's hot (20)

API Security Fundamentals
API Security Fundamentals
José Haro Peralta
 
Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface)
Vibhawa Nirmal
 
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
API Testing: The heart of functional testing" with Bj Rollison
API Testing: The heart of functional testing" with Bj Rollison
TEST Huddle
 
Mobile Device Security
Mobile Device Security
Nemwos
 
Android Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Test Automation Using Python | Edureka
Test Automation Using Python | Edureka
Edureka!
 
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
Matt Tesauro
 
Api testing
Api testing
HamzaMajid13
 
Port scanning
Port scanning
Hemanth Pasumarthi
 
industrial training report on Ethical hacking
industrial training report on Ethical hacking
Nitesh Dubey
 
Android Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Social engineering
Social engineering
Vishal Kumar
 
4 Mapping the Application
4 Mapping the Application
Sam Bowne
 
Honeypot Basics
Honeypot Basics
Manoj kumawat
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyber
Jahangirnagar University
 
Burpsuite 101
Burpsuite 101
n|u - The Open Security Community
 
Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface)
Vibhawa Nirmal
 
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Simplilearn
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
API Testing: The heart of functional testing" with Bj Rollison
API Testing: The heart of functional testing" with Bj Rollison
TEST Huddle
 
Mobile Device Security
Mobile Device Security
Nemwos
 
Android Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Test Automation Using Python | Edureka
Test Automation Using Python | Edureka
Edureka!
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
Matt Tesauro
 
industrial training report on Ethical hacking
industrial training report on Ethical hacking
Nitesh Dubey
 
Android Malware Detection Mechanisms
Android Malware Detection Mechanisms
Talha Kabakus
 
Social engineering
Social engineering
Vishal Kumar
 
4 Mapping the Application
4 Mapping the Application
Sam Bowne
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyber
Jahangirnagar University
 

Similar to iOS Application Security And Static Analysis.pdf (20)

Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
Pentesting iPhone applications
Pentesting iPhone applications
Satish b
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
iOS Application Pentesting
iOS Application Pentesting
n|u - The Open Security Community
 
ASFWS 2012 - Audit d’applications iOS par Julien Bachmann
ASFWS 2012 - Audit d’applications iOS par Julien Bachmann
Cyber Security Alliance
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
 
iOS Application Penetration Testing for Beginners
iOS Application Penetration Testing for Beginners
RyanISI
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
 
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
Abida Shariff
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
iOS application (in)security
iOS application (in)security
iphonepentest
 
Untitled 1
Untitled 1
Sergey Kochergan
 
Security testing of mobile applications
Security testing of mobile applications
GTestClub
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
Jason Haddix
 
iOS Application Security
iOS Application Security
Egor Tolstoy
 
iOS Application Exploitation
iOS Application Exploitation
Positive Hack Days
 
iOS Application Static Analysis - Deepika Kumari.pptx
iOS Application Static Analysis - Deepika Kumari.pptx
deepikakumari643428
 
iOS Application Penetation Test
iOS Application Penetation Test
JongWon Kim
 
一比一原版(UFV毕业证书)菲莎河谷大学毕业证成绩单如何办理
一比一原版(UFV毕业证书)菲莎河谷大学毕业证成绩单如何办理
oda35dsp
 
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证成绩单如何办理
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证成绩单如何办理
oda35dsp
 
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
Pentesting iPhone applications
Pentesting iPhone applications
Satish b
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
ASFWS 2012 - Audit d’applications iOS par Julien Bachmann
ASFWS 2012 - Audit d’applications iOS par Julien Bachmann
Cyber Security Alliance
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
 
iOS Application Penetration Testing for Beginners
iOS Application Penetration Testing for Beginners
RyanISI
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
 
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
Abida Shariff
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
iOS application (in)security
iOS application (in)security
iphonepentest
 
Security testing of mobile applications
Security testing of mobile applications
GTestClub
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
Jason Haddix
 
iOS Application Security
iOS Application Security
Egor Tolstoy
 
iOS Application Static Analysis - Deepika Kumari.pptx
iOS Application Static Analysis - Deepika Kumari.pptx
deepikakumari643428
 
iOS Application Penetation Test
iOS Application Penetation Test
JongWon Kim
 
一比一原版(UFV毕业证书)菲莎河谷大学毕业证成绩单如何办理
一比一原版(UFV毕业证书)菲莎河谷大学毕业证成绩单如何办理
oda35dsp
 
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证成绩单如何办理
一比一原版(Vancouver毕业证书)温哥华岛大学毕业证成绩单如何办理
oda35dsp
 
Ad

More from Cyber security professional services- Detox techno (9)

Black-Box Penetration Testing_ Advantages, Disadvantages, Techniques, and Too...
Black-Box Penetration Testing_ Advantages, Disadvantages, Techniques, and Too...
Cyber security professional services- Detox techno
 
Black-Box Penetration Testing_ Advantages, Disadvantages, Techniques, and Too...
Black-Box Penetration Testing_ Advantages, Disadvantages, Techniques, and Too...
Cyber security professional services- Detox techno
 
What are the 3 Phases of Penetration Testing
What are the 3 Phases of Penetration Testing
Cyber security professional services- Detox techno
 
What are the 3 Phases of Penetration Testing.pdf
What are the 3 Phases of Penetration Testing.pdf
Cyber security professional services- Detox techno
 
Types of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdf
Cyber security professional services- Detox techno
 
Top 12 Cyber Security Awareness Tips in 2022-Detox Technologies.pdf
Top 12 Cyber Security Awareness Tips in 2022-Detox Technologies.pdf
Cyber security professional services- Detox techno
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber security professional services- Detox techno
 
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
Cyber security professional services- Detox techno
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
Ad

Recently uploaded (20)

Supporting the NextGen 911 Digital Transformation with FME
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
Down the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training Roadblocks
Rustici Software
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
Providing an OGC API Processes REST Interface for FME Flow
Providing an OGC API Processes REST Interface for FME Flow
Safe Software
 
June Patch Tuesday
June Patch Tuesday
Ivanti
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely
 
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
 
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
SOFTTECHHUB
 
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
 
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
Edge AI and Vision Alliance
 
Supporting the NextGen 911 Digital Transformation with FME
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
Down the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training Roadblocks
Rustici Software
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
Providing an OGC API Processes REST Interface for FME Flow
Providing an OGC API Processes REST Interface for FME Flow
Safe Software
 
June Patch Tuesday
June Patch Tuesday
Ivanti
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely
 
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
 
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
SOFTTECHHUB
 
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
 
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
Edge AI and Vision Alliance
 

iOS Application Security And Static Analysis.pdf

  • 1. iOS Application Security And Static Analysis Application security refers to the strategies used to protect mobile applications, online apps, and APIs (Application Programming Interfaces) from hackers. In the mobile device market, iOS is the most popular operating system. Because of their popularity, a variety of apps have been developed, making them excellent targets for attackers.
  • 2. Today, we’ll look at how to perform static security pentesting on iOS apps, starting with bypassing SSL pinning and a few potential security flaws. Bypassing SSL Pinning on iOS Device The technique of linking a host with its certificate/public key is known as SSL Certificate Pinning. You pin a certificate or public key to a host after you have it. In other words, you set the app to refuse any certificates or public keys save one or a few predetermined ones. Bypassing SSL Pinning using Frida :- Frida:- Frida is a Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers that allows you to inject JavaScript snippets or your own libraries into native Windows, macOS, iOS, Android, and QNX programmes. Install Frida from Github :- https://github.com/frida/frida Install Frida on your Jailbroken iOS Device also through Cydia. Step 1:- Run command frida-ps -Uia to list all the running app’s on the device. Great. That is all the info you require.
  • 3. Step 2:- Now Run the command frida–codeshare federicodotta/ios13-pinning-bypass -f -U –no-pause. Here, Identifier is the bundle id of the application for which you want to bypass SSL Pinning. So to get the identifier run the command in step 1 . Step 3:- After the process is completed successfully. Configure your iOS device with burp suite and try to intercept the traffic of the app for which you bypassed SSL Pinning. Below is the example of amazon application:- Extracting the ipa file from any iOS Device You can use Imazing to extract the ipa file of any application installed on your iphone , whether your device is jailbroken or not.
  • 4. Install the application in your iOS device now go to Imazing, connect your device to your mac/windows and go to manage apps. There you will see a list of all the applications installed on your device and in the front of all app names you will see a download button as shown in the image below. Now Click on that button and the ipa of that application will be downloaded on your Pc. MobSF Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
  • 5. Plist Plist stands for Property List. It is a flexible and easy format for storing application data. It’s what we’d refer to as an iOS app’s manifest. Sometimes you can find sensitive data in these files like Gmap api keys etc. You can see Plist files in MobSf also or you can use the Objection Framework command.
  • 6. Objection Command → ios plist cat Info.plist Keychain Dump Keychain is a secure storage container on an iOS device that is used to store sensitive information such as usernames, passwords, network passwords, and auth tokens..It allows you to save account names, passwords, and credit card data safely and securely. Insecure Transport Layer ( App Transport Security ) If App Transport Security is disabled on the domain i.e :- {‘NSAllowsArbitraryLoads’: True}’,While ATS safeguards are maintained everywhere in your programme, disabling ATS might allow unsafe contact with specific servers or unsecured loads for web views or media.
  • 7. NsUserdefault File It is also a simple plist file in your app package which can be used to set and get data very easily. Its structure resembles that of a dictionary, and the user defaults are sometimes referred to as a key-value store. Hardcoded Api Keys Most of the apps need private/sensitive values, such as secrets , passwords & Api Keys which are stored in the application’s source code to setup third party SDKs or backend Api’s. During the build process or while using developer tools, such as interacting with an Apple Developer account, some secrets may be required. Binary Analysis using otool You can use otool (object file displaying tool) for further binary analysis of the application. The otool command displays sections of object files or libraries that you specify. You can check using otool
  • 8. that if the application is using weak hashing algorithms ,Banned/deprecated api’s, malloc function or insecure random number generators. Commands to check these are given below:- To Check for weak hashing algorithms: – ● Open the terminal and take the ssh of your Iphone. ● Command:- ssh root@ ● cd /var/containers/Bundle/Application// ● otool -Iv | grep -w _CC_MD5 ● otool -Iv | grep -w _CC_SHA1 To Check for Banned/Deprecated Api’s :- ● Open the terminal and take the ssh of your Iphone. ● Command:- ssh root@<IP> ● cd /var/containers/Bundle/Application/<APP_ID>/<app> ● otool -Iv <app> | grep -w _stat ● otool -Iv <app> | grep -w _sscanf ● otool -Iv <app> | grep -w _strncpy ● otool -Iv <app> | grep -w _strle Similarly is for malloc function and Insecure random number generator.
  • 9. Source Blog :- https://detoxtechnologies.com/ios-application-security-overview/ IOS Static Analysis || IOS Application Security || IOS Application Security Solutions || IOS Security Overview || IOS Application Security Testing