SlideShare a Scribd company logo
IOS PENTESTING:
A BEGINNER'S
PRACTICAL GUIDE
By Abida Shariff
Lead Security Engineer
WHOAMI
I’m Abida Shariff
Lead Security Engineer at Redsentry
Web Application, iOS & Android Researcher
OSCP, eJPT, CEH Certified
Just a curious geek
Jailbroken Devices and iOS Versions
Jailbreaking
Software
iOS Version
Support
Supported
Devices
Notes
Checkra1n Up to iOS 14.8.1 Up to iPhone X (A11
chip and older)
Uses checkm8
exploit
Palera1n iOS 15.0 to iOS
17.4
A11 chips and
older
Based on
checkm8 exploit
Dopamine iOS 15.0 to iOS
16.6.1
A12 to A16 and
M1 to M2 chips
Focuses on newer
devices, does not
support latest versions
beyond iOS 16.6.1
Emulators: Tools like Corellium offer cloud-based iOS environments for security
testing without needing physical devices.
Tools: A Pentester’s Arsenal
Frida:
Objection:
Otool:
● Dynamic instrumentation toolkit
● Allows injection of scripts into application
● Explore and modify runtime operations
● Package: build.frida.re
● Runtime mobile exploration toolkit
● Uses Frida
● Assesses security posture of mobile applications
● Inspecting the structure and contents of executable files and
libraries
● Analyzing binary dependencies and linked frameworks
● Debugging and reverse engineering applications
IPA File Structure
Payload Folder
● Main directory of the IPA file
● Contains all executable and non-executable files for the app
app Folder
● Contains the actual iOS application folder (.app directory)
● Includes the executable file of the app (e.g., AppName.app)
● Contains resources like images, sounds, and other assets
Info.plist
● Key file within the .app folder
● Contains metadata about the application
Version
Display name
SDK version
● Other configuration details necessary for the iOS system
Extracting and Exploring IPA
Files
Leverage powerful tools like IMazing, AppIndex,
IPAtool and via Filza to effectively extract IPA files from
your iOS devices, opening the door to deeper security
analysis and reverse engineering. Small Demo….
Installing IPA Files on Jailbroken Devices
To install IPA files on iOS devices, several tools can be used:
3uTools
● Windows and Mac users
● Manages iOS devices
● Features: IPA installation, jailbreaking, device management
Sideloadly
● Compatible with Windows and Mac
● Sideloads IPA files using an Apple ID
● Facilitates installation of apps not available on the App Store
TrollStore
● Install IPA’s directly from the device or via a computer
● No revokes or re-signing required
Jailbreak Detection and SSL Pinning
Bypass
Bypass Jailbreak Detection
● Hook into app's code
● Disable or alter jailbreak detection mechanisms
Bypass SSL Pinning
● Intercept and manipulate traffic
● Hook into app's SSL handling routines
Static Analysis of IPA Files
1 MobSF: Comprehensive App
Scanning
Leverage the Mobile Security Framework
(MobSF) to perform in-depth static
analysis on IPA files. Uncover code
vulnerabilities, sensitive data leaks, and
potential security weaknesses.
2 Otool: Examining Binary Structure
Use the powerful otool utility to inspect the
structure and contents of the IPA files
compiled binary. Identify libraries, and
other valuable information for security
assessment.
3 Frida: Dynamic Instrumentation
Integrate the Frida framework to
dynamically hook into the running iOS
app and observe its behavior,
intercept function calls, and uncover
hidden functionality.
4 Plist Editor Pro: View Plist Files
Plist Editor Pro is a tool used for viewing
plist files, to store settings and
configuration information.
Local Storage
Local storage refers to the various methods an application
uses to store data directly on a device. Key local storage
mechanisms include NSUserDefaults, used for storing user
preferences and small pieces of data, and Keychain, designed
for securely storing sensitive information such as passwords
and tokens.
References
https://book.hacktricks.xyz/mobile-pentesting/ios-
pentesting/frida-configuration-in-ios
https://mas.owasp.org/MASTG/tools/ios/MASTG-TOOL-
0074/
https://idevicecentral.com/ios-jailbreak-tool-finder/
https://redfoxsec.com/blog/sensitive-data-exposure-in-
local-storage-ios/
THANK YOU
Twitter
https://twitter.com/BawseOne
Linkedin
https://www.linkedin.com/in/abidashariff/
Ad

Recommended

Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
Abida Shariff
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
wphillips114
 
iOS Application Security And Static Analysis.pdf
iOS Application Security And Static Analysis.pdf
Cyber security professional services- Detox techno
 
iOS Application Static Analysis - Deepika Kumari.pptx
iOS Application Static Analysis - Deepika Kumari.pptx
deepikakumari643428
 
Wanna test IOS applications?
Wanna test IOS applications?
Vlada Kulish
 
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
[CONFidence 2016] Sławomir Kosowski - Introduction to iOS Application Securit...
PROIDEA
 
Hands-On iOS Application Penetraion Testing.pptx
Hands-On iOS Application Penetraion Testing.pptx
AkashKatare9
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
 
Hacking iOS Applications: A Detailed Testing Guide
Hacking iOS Applications: A Detailed Testing Guide
Security Innovation
 
Introduction to iOS Penetration Testing
Introduction to iOS Penetration Testing
OWASP
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
Jason Haddix
 
Your Ultimate Guide to iOS Pentesting.pdf
Your Ultimate Guide to iOS Pentesting.pdf
DataSpace Academy
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
DefconRussia
 
OWASP for iOS
OWASP for iOS
Phineas Huang
 
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
MOBILE PENTESTING Frida.pdf
MOBILE PENTESTING Frida.pdf
Adityamd4
 
iOS Application Exploitation
iOS Application Exploitation
Positive Hack Days
 
iOS Application Security
iOS Application Security
Egor Tolstoy
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
 
Security in iOS
Security in iOS
Clement Prem
 
Pentesting iOS Apps
Pentesting iOS Apps
Herman Duarte
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
 
iOS Client Side Analysis
iOS Client Side Analysis
Aadarsh N
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
eightbit
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
 
Ian McAllister - Respected Photographer And Writer
Ian McAllister - Respected Photographer And Writer
Ian McAllister
 
Book - Behavioral finance and wealth management(1).pdf
Book - Behavioral finance and wealth management(1).pdf
GamingwithUBAID
 

More Related Content

Similar to 一比一原版(UFV毕业证书)菲莎河谷大学毕业证成绩单如何办理 (20)

Hacking iOS Applications: A Detailed Testing Guide
Hacking iOS Applications: A Detailed Testing Guide
Security Innovation
 
Introduction to iOS Penetration Testing
Introduction to iOS Penetration Testing
OWASP
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
Jason Haddix
 
Your Ultimate Guide to iOS Pentesting.pdf
Your Ultimate Guide to iOS Pentesting.pdf
DataSpace Academy
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
DefconRussia
 
OWASP for iOS
OWASP for iOS
Phineas Huang
 
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
MOBILE PENTESTING Frida.pdf
MOBILE PENTESTING Frida.pdf
Adityamd4
 
iOS Application Exploitation
iOS Application Exploitation
Positive Hack Days
 
iOS Application Security
iOS Application Security
Egor Tolstoy
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
 
Security in iOS
Security in iOS
Clement Prem
 
Pentesting iOS Apps
Pentesting iOS Apps
Herman Duarte
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
 
iOS Client Side Analysis
iOS Client Side Analysis
Aadarsh N
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
eightbit
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
 
Hacking iOS Applications: A Detailed Testing Guide
Hacking iOS Applications: A Detailed Testing Guide
Security Innovation
 
Introduction to iOS Penetration Testing
Introduction to iOS Penetration Testing
OWASP
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
Jason Haddix
 
Your Ultimate Guide to iOS Pentesting.pdf
Your Ultimate Guide to iOS Pentesting.pdf
DataSpace Academy
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
DefconRussia
 
Pentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
MOBILE PENTESTING Frida.pdf
MOBILE PENTESTING Frida.pdf
Adityamd4
 
iOS Application Security
iOS Application Security
Egor Tolstoy
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
Sam Bowne
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
 
iOS Client Side Analysis
iOS Client Side Analysis
Aadarsh N
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
eightbit
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
eightbit
 

Recently uploaded (20)

Ian McAllister - Respected Photographer And Writer
Ian McAllister - Respected Photographer And Writer
Ian McAllister
 
Book - Behavioral finance and wealth management(1).pdf
Book - Behavioral finance and wealth management(1).pdf
GamingwithUBAID
 
Vacuum Truck Industry Insights & Outlook
Vacuum Truck Industry Insights & Outlook
chanderdeepseoexpert
 
IEA_Press_Release_Tullow_Agreement-16-6-2025-1.pdf
IEA_Press_Release_Tullow_Agreement-16-6-2025-1.pdf
businessweekghana
 
🧪 JIS Z 8901 Class 8 Kanto Loam .pdf
🧪 JIS Z 8901 Class 8 Kanto Loam .pdf
Particle Powder
 
Kenyan Msme Export Book by Dickens Aluha Mujumba
Kenyan Msme Export Book by Dickens Aluha Mujumba
JoshuaKihara
 
BOURNS POTENTIOMETER Provide You Precision
BOURNS POTENTIOMETER Provide You Precision
smidmart
 
The Key Cultural Role of Pune’s Shivsrushti
The Key Cultural Role of Pune’s Shivsrushti
kapoorgita1991
 
chapter 9 leadership qualityies university of windsor
chapter 9 leadership qualityies university of windsor
zamananalyst29
 
zlib.pub_fundamental-analysis-for-investors-4th-edition.pdf
zlib.pub_fundamental-analysis-for-investors-4th-edition.pdf
ssuserc74044
 
PT IBX Daya Nusantara Company Profile 2025
PT IBX Daya Nusantara Company Profile 2025
IBX Daya Nusantara
 
Oleksandr Osypenko: Комунікації у проєкті (UA)
Oleksandr Osypenko: Комунікації у проєкті (UA)
Lviv Startup Club
 
International Business, 4th Edition- Alan M. Rugman.pdf
International Business, 4th Edition- Alan M. Rugman.pdf
GamingwithUBAID
 
Architecture that Advances Part I Review.pdf
Architecture that Advances Part I Review.pdf
Brij Consulting, LLC
 
The Executive’s Guide to Stress-Free Airport Transfers in London
The Executive’s Guide to Stress-Free Airport Transfers in London
Jannah Express
 
20250606_A. Stotz All Weather Strategy - Weights update & Performance review ...
20250606_A. Stotz All Weather Strategy - Weights update & Performance review ...
FINNOMENAMarketing
 
Redefining Business Experiences: The Role of a Corporate Event Management Com...
Redefining Business Experiences: The Role of a Corporate Event Management Com...
Be Executive Events
 
Podcast Show Notes - Rapid International Expansion for Scale-up Stage Tech Bu...
Podcast Show Notes - Rapid International Expansion for Scale-up Stage Tech Bu...
Dave Litwiller
 
Chapter 7.ppt for marketing planning and research
Chapter 7.ppt for marketing planning and research
selvavishnuchelliah2
 
The Innovative Cybersecurity Leaders Driving Business Growth in 2025.pdf
The Innovative Cybersecurity Leaders Driving Business Growth in 2025.pdf
ciolook1
 
Ian McAllister - Respected Photographer And Writer
Ian McAllister - Respected Photographer And Writer
Ian McAllister
 
Book - Behavioral finance and wealth management(1).pdf
Book - Behavioral finance and wealth management(1).pdf
GamingwithUBAID
 
Vacuum Truck Industry Insights & Outlook
Vacuum Truck Industry Insights & Outlook
chanderdeepseoexpert
 
IEA_Press_Release_Tullow_Agreement-16-6-2025-1.pdf
IEA_Press_Release_Tullow_Agreement-16-6-2025-1.pdf
businessweekghana
 
🧪 JIS Z 8901 Class 8 Kanto Loam .pdf
🧪 JIS Z 8901 Class 8 Kanto Loam .pdf
Particle Powder
 
Kenyan Msme Export Book by Dickens Aluha Mujumba
Kenyan Msme Export Book by Dickens Aluha Mujumba
JoshuaKihara
 
BOURNS POTENTIOMETER Provide You Precision
BOURNS POTENTIOMETER Provide You Precision
smidmart
 
The Key Cultural Role of Pune’s Shivsrushti
The Key Cultural Role of Pune’s Shivsrushti
kapoorgita1991
 
chapter 9 leadership qualityies university of windsor
chapter 9 leadership qualityies university of windsor
zamananalyst29
 
zlib.pub_fundamental-analysis-for-investors-4th-edition.pdf
zlib.pub_fundamental-analysis-for-investors-4th-edition.pdf
ssuserc74044
 
PT IBX Daya Nusantara Company Profile 2025
PT IBX Daya Nusantara Company Profile 2025
IBX Daya Nusantara
 
Oleksandr Osypenko: Комунікації у проєкті (UA)
Oleksandr Osypenko: Комунікації у проєкті (UA)
Lviv Startup Club
 
International Business, 4th Edition- Alan M. Rugman.pdf
International Business, 4th Edition- Alan M. Rugman.pdf
GamingwithUBAID
 
Architecture that Advances Part I Review.pdf
Architecture that Advances Part I Review.pdf
Brij Consulting, LLC
 
The Executive’s Guide to Stress-Free Airport Transfers in London
The Executive’s Guide to Stress-Free Airport Transfers in London
Jannah Express
 
20250606_A. Stotz All Weather Strategy - Weights update & Performance review ...
20250606_A. Stotz All Weather Strategy - Weights update & Performance review ...
FINNOMENAMarketing
 
Redefining Business Experiences: The Role of a Corporate Event Management Com...
Redefining Business Experiences: The Role of a Corporate Event Management Com...
Be Executive Events
 
Podcast Show Notes - Rapid International Expansion for Scale-up Stage Tech Bu...
Podcast Show Notes - Rapid International Expansion for Scale-up Stage Tech Bu...
Dave Litwiller
 
Chapter 7.ppt for marketing planning and research
Chapter 7.ppt for marketing planning and research
selvavishnuchelliah2
 
The Innovative Cybersecurity Leaders Driving Business Growth in 2025.pdf
The Innovative Cybersecurity Leaders Driving Business Growth in 2025.pdf
ciolook1
 
Ad

一比一原版(UFV毕业证书)菲莎河谷大学毕业证成绩单如何办理

  • 1. IOS PENTESTING: A BEGINNER'S PRACTICAL GUIDE By Abida Shariff Lead Security Engineer
  • 2. WHOAMI I’m Abida Shariff Lead Security Engineer at Redsentry Web Application, iOS & Android Researcher OSCP, eJPT, CEH Certified Just a curious geek
  • 3. Jailbroken Devices and iOS Versions Jailbreaking Software iOS Version Support Supported Devices Notes Checkra1n Up to iOS 14.8.1 Up to iPhone X (A11 chip and older) Uses checkm8 exploit Palera1n iOS 15.0 to iOS 17.4 A11 chips and older Based on checkm8 exploit Dopamine iOS 15.0 to iOS 16.6.1 A12 to A16 and M1 to M2 chips Focuses on newer devices, does not support latest versions beyond iOS 16.6.1 Emulators: Tools like Corellium offer cloud-based iOS environments for security testing without needing physical devices.
  • 4. Tools: A Pentester’s Arsenal Frida: Objection: Otool: ● Dynamic instrumentation toolkit ● Allows injection of scripts into application ● Explore and modify runtime operations ● Package: build.frida.re ● Runtime mobile exploration toolkit ● Uses Frida ● Assesses security posture of mobile applications ● Inspecting the structure and contents of executable files and libraries ● Analyzing binary dependencies and linked frameworks ● Debugging and reverse engineering applications
  • 5. IPA File Structure Payload Folder ● Main directory of the IPA file ● Contains all executable and non-executable files for the app app Folder ● Contains the actual iOS application folder (.app directory) ● Includes the executable file of the app (e.g., AppName.app) ● Contains resources like images, sounds, and other assets Info.plist ● Key file within the .app folder ● Contains metadata about the application Version Display name SDK version ● Other configuration details necessary for the iOS system
  • 6. Extracting and Exploring IPA Files Leverage powerful tools like IMazing, AppIndex, IPAtool and via Filza to effectively extract IPA files from your iOS devices, opening the door to deeper security analysis and reverse engineering. Small Demo….
  • 7. Installing IPA Files on Jailbroken Devices To install IPA files on iOS devices, several tools can be used: 3uTools ● Windows and Mac users ● Manages iOS devices ● Features: IPA installation, jailbreaking, device management Sideloadly ● Compatible with Windows and Mac ● Sideloads IPA files using an Apple ID ● Facilitates installation of apps not available on the App Store TrollStore ● Install IPA’s directly from the device or via a computer ● No revokes or re-signing required
  • 8. Jailbreak Detection and SSL Pinning Bypass Bypass Jailbreak Detection ● Hook into app's code ● Disable or alter jailbreak detection mechanisms Bypass SSL Pinning ● Intercept and manipulate traffic ● Hook into app's SSL handling routines
  • 9. Static Analysis of IPA Files 1 MobSF: Comprehensive App Scanning Leverage the Mobile Security Framework (MobSF) to perform in-depth static analysis on IPA files. Uncover code vulnerabilities, sensitive data leaks, and potential security weaknesses. 2 Otool: Examining Binary Structure Use the powerful otool utility to inspect the structure and contents of the IPA files compiled binary. Identify libraries, and other valuable information for security assessment. 3 Frida: Dynamic Instrumentation Integrate the Frida framework to dynamically hook into the running iOS app and observe its behavior, intercept function calls, and uncover hidden functionality. 4 Plist Editor Pro: View Plist Files Plist Editor Pro is a tool used for viewing plist files, to store settings and configuration information.
  • 10. Local Storage Local storage refers to the various methods an application uses to store data directly on a device. Key local storage mechanisms include NSUserDefaults, used for storing user preferences and small pieces of data, and Keychain, designed for securely storing sensitive information such as passwords and tokens.