Penetration Testing of iOS Applications
Pentesting Testing of iOS Applications
++++Installing Frida and Objection:
- pip install -U objection
- pip install -U frida
- https://build.frida.re
- frida-ps -U
- frida-ps -Uai
++++Application Exploration:
A-To browse applications file-
ls
B- Print current directory
pwd print
C-To browse applications file
cd /folder/path/name
++++Sensitive Data Exposure
1. Dump .plist files:
A- Print environment information
env
B-Go to document folder
cd /var/mobile/Containers/Data/Application/<>/Documents
ls
C-Download .plist file
file download Credentials.plist creds.plist
It will get stored in your “C:\Users\USERNAME” path as “creds.plist” name.
D-To read that downloaded file:
!type creds.plist
2. Dump keychain file of Target Application:
ios keychain dump
A-Print environment information
env
B-Goto document folder
cd /var/mobile/Containers/Data/Application/<>/Documents
C-Download .sqlite file
sqlite connect /var/mobile/Containers/Data/Application/<>/Documents/Credentials.sqlite file
4. Memory Dump:
A-We will download and save memory dump into json file:
memory list modules --json memory.json
B-It will list memory modules and store in “memory.json”
C-To read memory.json
!type memory.json
++++SSL pinning Disable/Bypass:
ios-sslpinning-disable
++++Dump cookies stored by Target Application:
ios cookies get
++++Job listing and Kill:
A-To list out all running jobs:
jobs list
B-Note job id to be killed
C-Run following command to kill job
++++Jobs Kill JobID:
Rebuild ipa from installed package->>>ipainstaller -b <Package Name>
Thanks for the valuable information. for more information visit us on Top Digital Marketing Institutes in Solapur
ReplyDelete