Penetration Testing of iOS Applications

Pentesting Testing of iOS Applications

++++Installing Frida and Objection:

  • pip install -U objection
  • pip install -U frida
  • https://build.frida.re
  • frida-ps -U
  • frida-ps -Uai

++++Application Exploration:

A-To browse applications file-

ls

B- Print current directory

pwd print

C-To browse applications file

cd /folder/path/name

++++Sensitive Data Exposure

1. Dump .plist files:

A- Print environment information

env

B-Go to document folder

cd /var/mobile/Containers/Data/Application/<>/Documents

ls

C-Download .plist file

file download Credentials.plist creds.plist

It will get stored in your “C:\Users\USERNAME” path as “creds.plist” name.

D-To read that downloaded file:

!type creds.plist

2. Dump keychain file of Target Application:

ios keychain dump

3. Dump sqlite files:

A-Print environment information

env

B-Goto document folder

cd /var/mobile/Containers/Data/Application/<>/Documents

C-Download .sqlite file

sqlite connect /var/mobile/Containers/Data/Application/<>/Documents/Credentials.sqlite file

4. Memory Dump:

A-We will download and save memory dump into json file:

memory list modules --json memory.json

B-It will list memory modules and store in “memory.json”

C-To read memory.json

!type memory.json

++++SSL pinning Disable/Bypass:

ios-sslpinning-disable

++++Dump cookies stored by Target Application:

ios cookies get

++++Job listing and Kill:

A-To list out all running jobs:

jobs list

B-Note job id to be killed

C-Run following command to kill job

++++Jobs Kill JobID:

Rebuild ipa from installed package->>>ipainstaller -b <Package Name>


Comments

Post a Comment

Popular posts from this blog

Polaris’ Intellect Core Banking Software Version 9.7.1- Open Redirect [CVE-2018-14931]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

Stored XSS Vulnerability in Bookme Control Panel 2.0-[CVE-2018-8737]