SlideShare a Scribd company logo
Getting Started With
Hacking Android & iOS Apps
Tools, Techniques & Resources
Abhinav Mishra
Founder, ENCIPHERS
ENCIPHERS
InfoSec Consulting | Training
@enciphers_
@0ctac0der
www.enciphers.com
Mobile
Application
Penetration
Testing
What to do? What
Why to do?
How to do?
Where to go, if you are
stuck?
Why
How
Where
This is a 1 hour talk. I strongly believe that in focusing on technical
parts in one hour, is not the best approach.
Hence, this talk will majorly be about the methodology and discussing
resources.
Disclaimer
What to
test? What
to look for? The methodology should be based on
knowledge, not the tools
01
What?
The mobile application penetration testing is mainly divided in two parts:
● Static Analysis
○ As the name suggests, stuff that can be tested statically. Maybe even without installing the app.
● Dynamic Analysis
○ As the name suggests, stuff that can be tested when the app is running. Network calls, crypto,
storage etc.
What?
What are the ingredients of a mobile application?
● Do you know the structure of the application package?
○ IPA | APK ~ Zip
● Manifest | Plist
● Resources that the app would need
● Source code
● XML? Config? Res? Certs etc.
What?
What happens when you install and use a mobile app?
● Permission on device?
○ To access data, use hardware, access other apps etc.
● Provide personal/account data.
○ Username/Email/Password etc.
● Network calls?
○ TLS? MITM?
● On device Security? Data at rest.
○ Crypto? Storage details
● API Security?
○ IDOR?
○ Authorisation/Authentication?
What?
Anything else on the device which:
● Handles user and application data
● Handles network connection
● Uses device permissions
● Implements a security control
Ok, so we know what all things are there to be tested/analysed. But why do we need to test each of these
things?
● Static Analysis:
○ Sensitive information inside app package might lead to more attack surface.
○ Bad crypto implementation might be bypassed.
● Dynamic Analysis
○ User and application internal data should be safeguarded
○ Not implementing a security control is a security issue, bypassing it might not always be
○ Request and response is the place where all the action happens, this should be secure
○ APIs, are the biggest source of vulnerabilities in mobile applications
Why?
If you know what to test and why to test, then finding or knowing how to test that might be
the easiest part.
IMHO, majority of people focus only on this section…
● What tools to use?
● How to use the tools?
● Click to hack/secure applications
So, let’s talk about how to do each of these....
How?
What to test?
● Mobile Application Security Testing Checklist
How to test?
● Setting up lab?
○ Hardware Requirements:
■ Android:
● Android Studio/ADB
● Any virtual device, Genymotion, AVD & Tools
■ iOS:
● Preferably Mac, or a high (good) config laptop
● iDevice (iPhone, iPad etc.) [Thanks to Checkra1n]
Tools, Techniques & Resources?
Mobexler: A customised virtual machine, designed to help in penetration testing of Android & iOS
applications.
When to use:
● Does not have Mac
● Don’t want to install a large amount of security tools on Mac
● Want to test Android & iOS apps at the same time, from the same setup
Let’s get to Mobexler then.
Mobexler
Tools?
● Android: https://enciphers.com/awesome-android-application-security/
● iOS: https://enciphers.com/awesome-ios-application-security/
Resources?
● Jailbreaking: https://canijailbreak.com/
● Mobile application hacker's handbook
● OWASP MSTG: https://mobile-security.gitbook.io/mobile-security-testing-guide/
● Talks on iOS & Android Security:
○ Android: https://www.youtube.com/watch?v=B3Udl86Zu20&t=20700s
○ iOS: https://www.youtube.com/watch?v=B3Udl86Zu20&t=22920s
○ Demystifying Frida: https://www.youtube.com/watch?v=kd05JjCqViY
● Blogs:
○ iOS Security: http://www.allysonomalley.com/
○ Reverse engg. iOS apps: https://github.com/ivRodriguezCA/RE-iOS-Apps
○ Android Security:
https://medium.com/knowing-android/modern-security-in-android-part-1-6282bcb71e6c
Tools, Techniques & Resources?
Resources?
● Frida Cheat Sheet, for Android: https://erev0s.com/blog/frida-code-snippets-for-android/
● Android App Reverse Engg: https://maddiestone.github.io/AndroidAppRE/
Techniques:
● Jailbreak bypass in iOS: https://syrion.me/blog/ios-swift-antijailbreak-bypass-frida/
● SSL Pinning bypass: https://www.cyclon3.com/bypass-instagram-ssl-certificate-pinning-for-ios
● Xamarin cert pinning bypass:
https://www.gosecure.net/blog/2020/04/06/bypassing-xamarin-certificate-pinning-on-android/
● Frida scripts: https://codeshare.frida.re/
● Frida Scripts: https://github.com/0xdea/frida-scripts
Trainings:
● iOS Application Security: https://www.enciphers-trainings.com/p/ios-application-security
Tools, Techniques & Resources?
Questions?(There's) no such thing as a stupid question.
CREDITS: This presentation template was created by Slidesgo, including
icons by Flaticon, and infographics & images by Freepik.
THANKS!
Do you have more questions?
a@enciphers.com
Join Slack: Invite Link

More Related Content

PDF
Threat hunting 101 by Sandeep Singh
PDF
(SACON) Shomiron das gupta - threat hunting use cases
PDF
Threat Hunting
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
PPTX
Threat hunting - Every day is hunting season
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Crowd-Sourced Threat Intelligence
PDF
OWASP Mobile Top 10
Threat hunting 101 by Sandeep Singh
(SACON) Shomiron das gupta - threat hunting use cases
Threat Hunting
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Threat hunting - Every day is hunting season
Bsides 2019 - Intelligent Threat Hunting
Crowd-Sourced Threat Intelligence
OWASP Mobile Top 10

What's hot (20)

PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPTX
Owasp for testing_mobile_apps_opd
PPTX
Red team Engagement
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Threat Hunting Report
PPTX
How to assign a CVE to yourself?
PDF
Enabling effective hunt teaming and incident response
PPTX
Maltego Webinar Slides
PDF
OSINT Basics for Threat Hunters and Practitioners
PPTX
Berkarir di Cyber Security
PDF
Threat Hunting with Splunk
PPTX
Threat hunting and achieving security maturity
PDF
Security by Design: An Introduction to Drupal Security
PPTX
Abstract Tools for Effective Threat Hunting
PPTX
Malware Analysis
PDF
Enfilade: Tool to Detect Infections in MongoDB Instances
PPTX
Basics of getting Into Bug Bounty Hunting
PPS
Information Gathering with Google (c0c0n - India)
PDF
Advanced Threats and Lateral Movement Detection
PPTX
Threat Hunting with Splunk Hands-on
Down The Rabbit Hole, From Networker to Security Professional
Owasp for testing_mobile_apps_opd
Red team Engagement
Effective Threat Hunting with Tactical Threat Intelligence
Threat Hunting Report
How to assign a CVE to yourself?
Enabling effective hunt teaming and incident response
Maltego Webinar Slides
OSINT Basics for Threat Hunters and Practitioners
Berkarir di Cyber Security
Threat Hunting with Splunk
Threat hunting and achieving security maturity
Security by Design: An Introduction to Drupal Security
Abstract Tools for Effective Threat Hunting
Malware Analysis
Enfilade: Tool to Detect Infections in MongoDB Instances
Basics of getting Into Bug Bounty Hunting
Information Gathering with Google (c0c0n - India)
Advanced Threats and Lateral Movement Detection
Threat Hunting with Splunk Hands-on

Similar to Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources (20)

PDF
Year Zero
PDF
CocoaConf Austin 2014 | Demystifying Security Best Practices
PPTX
UX Workshop: How to design a product with great user experience
PDF
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
PDF
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PDF
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
PDF
Sigma Open Tech Week: Bitter Truth About Software Security
PDF
YOW! Connected 2014 - Developing Secure iOS Applications
PPTX
Android Security
PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
PPTX
Security Tips for Android App - iTrobes
PDF
Just4Meeting 2012 - How to protect your web applications
PDF
Guard your Android
PDF
Why Mobile App Penetration Testing Matters.pdf
PDF
Is my app secure?
PDF
Is My App Secure ?
PDF
The Human Side of Security
PDF
Android N Security Overview - Mobile Security Saturday at Ciklum
DOCX
What are security considerations for mobile app development? MAE
Year Zero
CocoaConf Austin 2014 | Demystifying Security Best Practices
UX Workshop: How to design a product with great user experience
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Sigma Open Tech Week: Bitter Truth About Software Security
YOW! Connected 2014 - Developing Secure iOS Applications
Android Security
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
Security Tips for Android App - iTrobes
Just4Meeting 2012 - How to protect your web applications
Guard your Android
Why Mobile App Penetration Testing Matters.pdf
Is my app secure?
Is My App Secure ?
The Human Side of Security
Android N Security Overview - Mobile Security Saturday at Ciklum
What are security considerations for mobile app development? MAE

More from OWASP Delhi (20)

PDF
Securing dns records from subdomain takeover
PDF
Effective Cyber Security Report Writing
PPTX
Data sniffing over Air Gap
PPTX
UDP Hunter
PDF
Demystifying Container Escapes
PPTX
Automating WAF using Terraform
PPTX
Actionable Threat Intelligence
PPTX
Owasp top 10 vulnerabilities
PPTX
Recon with Nmap
PPTX
Securing AWS environments by Ankit Giri
PDF
DMARC Overview
PDF
Cloud assessments by :- Aakash Goel
PDF
Pentesting Rest API's by :- Gaurang Bhatnagar
ODP
Wireless security beyond password cracking by Mohit Ranjan
PDF
IETF's Role and Mandate in Internet Governance by Mohit Batra
PDF
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
PPTX
ICS Security 101 by Sandeep Singh
PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
ODP
Hostile Subdomain Takeover by Ankit Prateek
PDF
DFIR using Docker Containers by Deep Shankar Yadav
Securing dns records from subdomain takeover
Effective Cyber Security Report Writing
Data sniffing over Air Gap
UDP Hunter
Demystifying Container Escapes
Automating WAF using Terraform
Actionable Threat Intelligence
Owasp top 10 vulnerabilities
Recon with Nmap
Securing AWS environments by Ankit Giri
DMARC Overview
Cloud assessments by :- Aakash Goel
Pentesting Rest API's by :- Gaurang Bhatnagar
Wireless security beyond password cracking by Mohit Ranjan
IETF's Role and Mandate in Internet Governance by Mohit Batra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
ICS Security 101 by Sandeep Singh
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Hostile Subdomain Takeover by Ankit Prateek
DFIR using Docker Containers by Deep Shankar Yadav

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Monthly Chronicles - July 2025
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources

  • 1. Getting Started With Hacking Android & iOS Apps Tools, Techniques & Resources
  • 2. Abhinav Mishra Founder, ENCIPHERS ENCIPHERS InfoSec Consulting | Training @enciphers_ @0ctac0der www.enciphers.com
  • 3. Mobile Application Penetration Testing What to do? What Why to do? How to do? Where to go, if you are stuck? Why How Where
  • 4. This is a 1 hour talk. I strongly believe that in focusing on technical parts in one hour, is not the best approach. Hence, this talk will majorly be about the methodology and discussing resources. Disclaimer
  • 5. What to test? What to look for? The methodology should be based on knowledge, not the tools 01
  • 6. What? The mobile application penetration testing is mainly divided in two parts: ● Static Analysis ○ As the name suggests, stuff that can be tested statically. Maybe even without installing the app. ● Dynamic Analysis ○ As the name suggests, stuff that can be tested when the app is running. Network calls, crypto, storage etc.
  • 7. What? What are the ingredients of a mobile application? ● Do you know the structure of the application package? ○ IPA | APK ~ Zip ● Manifest | Plist ● Resources that the app would need ● Source code ● XML? Config? Res? Certs etc.
  • 8. What? What happens when you install and use a mobile app? ● Permission on device? ○ To access data, use hardware, access other apps etc. ● Provide personal/account data. ○ Username/Email/Password etc. ● Network calls? ○ TLS? MITM? ● On device Security? Data at rest. ○ Crypto? Storage details ● API Security? ○ IDOR? ○ Authorisation/Authentication?
  • 9. What? Anything else on the device which: ● Handles user and application data ● Handles network connection ● Uses device permissions ● Implements a security control
  • 10. Ok, so we know what all things are there to be tested/analysed. But why do we need to test each of these things? ● Static Analysis: ○ Sensitive information inside app package might lead to more attack surface. ○ Bad crypto implementation might be bypassed. ● Dynamic Analysis ○ User and application internal data should be safeguarded ○ Not implementing a security control is a security issue, bypassing it might not always be ○ Request and response is the place where all the action happens, this should be secure ○ APIs, are the biggest source of vulnerabilities in mobile applications Why?
  • 11. If you know what to test and why to test, then finding or knowing how to test that might be the easiest part. IMHO, majority of people focus only on this section… ● What tools to use? ● How to use the tools? ● Click to hack/secure applications So, let’s talk about how to do each of these.... How?
  • 12. What to test? ● Mobile Application Security Testing Checklist How to test? ● Setting up lab? ○ Hardware Requirements: ■ Android: ● Android Studio/ADB ● Any virtual device, Genymotion, AVD & Tools ■ iOS: ● Preferably Mac, or a high (good) config laptop ● iDevice (iPhone, iPad etc.) [Thanks to Checkra1n] Tools, Techniques & Resources?
  • 13. Mobexler: A customised virtual machine, designed to help in penetration testing of Android & iOS applications. When to use: ● Does not have Mac ● Don’t want to install a large amount of security tools on Mac ● Want to test Android & iOS apps at the same time, from the same setup Let’s get to Mobexler then. Mobexler
  • 14. Tools? ● Android: https://enciphers.com/awesome-android-application-security/ ● iOS: https://enciphers.com/awesome-ios-application-security/ Resources? ● Jailbreaking: https://canijailbreak.com/ ● Mobile application hacker's handbook ● OWASP MSTG: https://mobile-security.gitbook.io/mobile-security-testing-guide/ ● Talks on iOS & Android Security: ○ Android: https://www.youtube.com/watch?v=B3Udl86Zu20&t=20700s ○ iOS: https://www.youtube.com/watch?v=B3Udl86Zu20&t=22920s ○ Demystifying Frida: https://www.youtube.com/watch?v=kd05JjCqViY ● Blogs: ○ iOS Security: http://www.allysonomalley.com/ ○ Reverse engg. iOS apps: https://github.com/ivRodriguezCA/RE-iOS-Apps ○ Android Security: https://medium.com/knowing-android/modern-security-in-android-part-1-6282bcb71e6c Tools, Techniques & Resources?
  • 15. Resources? ● Frida Cheat Sheet, for Android: https://erev0s.com/blog/frida-code-snippets-for-android/ ● Android App Reverse Engg: https://maddiestone.github.io/AndroidAppRE/ Techniques: ● Jailbreak bypass in iOS: https://syrion.me/blog/ios-swift-antijailbreak-bypass-frida/ ● SSL Pinning bypass: https://www.cyclon3.com/bypass-instagram-ssl-certificate-pinning-for-ios ● Xamarin cert pinning bypass: https://www.gosecure.net/blog/2020/04/06/bypassing-xamarin-certificate-pinning-on-android/ ● Frida scripts: https://codeshare.frida.re/ ● Frida Scripts: https://github.com/0xdea/frida-scripts Trainings: ● iOS Application Security: https://www.enciphers-trainings.com/p/ios-application-security Tools, Techniques & Resources?
  • 16. Questions?(There's) no such thing as a stupid question.
  • 17. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik. THANKS! Do you have more questions? a@enciphers.com Join Slack: Invite Link