SlideShare a Scribd company logo
5
Most read
6
Most read
7
Most read
IOS PENTESTING:
A BEGINNER'S
PRACTICAL GUIDE
By Abida Shariff
Lead Security Engineer
WHOAMI
I’m Abida Shariff
Lead Security Engineer at Redsentry
Web Application, iOS & Android Researcher
OSCP, eJPT, CEH Certified
Just a curious geek
Jailbroken Devices and iOS Versions
Jailbreaking
Software
iOS Version
Support
Supported
Devices
Notes
Checkra1n Up to iOS 14.8.1 Up to iPhone X (A11
chip and older)
Uses checkm8
exploit
Palera1n iOS 15.0 to iOS
17.4
A11 chips and
older
Based on
checkm8 exploit
Dopamine iOS 15.0 to iOS
16.6.1
A12 to A16 and
M1 to M2 chips
Focuses on newer
devices, does not
support latest versions
beyond iOS 16.6.1
Emulators: Tools like Corellium offer cloud-based iOS environments for security
testing without needing physical devices.
Tools: A Pentester’s Arsenal
Frida:
Objection:
Otool:
● Dynamic instrumentation toolkit
● Allows injection of scripts into application
● Explore and modify runtime operations
● Package: build.frida.re
● Runtime mobile exploration toolkit
● Uses Frida
● Assesses security posture of mobile applications
● Inspecting the structure and contents of executable files and
libraries
● Analyzing binary dependencies and linked frameworks
● Debugging and reverse engineering applications
IPA File Structure
Payload Folder
● Main directory of the IPA file
● Contains all executable and non-executable files for the app
app Folder
● Contains the actual iOS application folder (.app directory)
● Includes the executable file of the app (e.g., AppName.app)
● Contains resources like images, sounds, and other assets
Info.plist
● Key file within the .app folder
● Contains metadata about the application
Version
Display name
SDK version
● Other configuration details necessary for the iOS system
Extracting and Exploring IPA
Files
Leverage powerful tools like IMazing, AppIndex,
IPAtool and via Filza to effectively extract IPA files from
your iOS devices, opening the door to deeper security
analysis and reverse engineering. Small Demo….
Installing IPA Files on Jailbroken Devices
To install IPA files on iOS devices, several tools can be used:
3uTools
● Windows and Mac users
● Manages iOS devices
● Features: IPA installation, jailbreaking, device management
Sideloadly
● Compatible with Windows and Mac
● Sideloads IPA files using an Apple ID
● Facilitates installation of apps not available on the App Store
TrollStore
● Install IPA’s directly from the device or via a computer
● No revokes or re-signing required
Jailbreak Detection and SSL Pinning
Bypass
Bypass Jailbreak Detection
● Hook into app's code
● Disable or alter jailbreak detection mechanisms
Bypass SSL Pinning
● Intercept and manipulate traffic
● Hook into app's SSL handling routines
Static Analysis of IPA Files
1 MobSF: Comprehensive App
Scanning
Leverage the Mobile Security Framework
(MobSF) to perform in-depth static
analysis on IPA files. Uncover code
vulnerabilities, sensitive data leaks, and
potential security weaknesses.
2 Otool: Examining Binary Structure
Use the powerful otool utility to inspect the
structure and contents of the IPA files
compiled binary. Identify libraries, and
other valuable information for security
assessment.
3 Frida: Dynamic Instrumentation
Integrate the Frida framework to
dynamically hook into the running iOS
app and observe its behavior,
intercept function calls, and uncover
hidden functionality.
4 Plist Editor Pro: View Plist Files
Plist Editor Pro is a tool used for viewing
plist files, to store settings and
configuration information.
Local Storage
Local storage refers to the various methods an application
uses to store data directly on a device. Key local storage
mechanisms include NSUserDefaults, used for storing user
preferences and small pieces of data, and Keychain, designed
for securely storing sensitive information such as passwords
and tokens.
References
https://book.hacktricks.xyz/mobile-pentesting/ios-
pentesting/frida-configuration-in-ios
https://mas.owasp.org/MASTG/tools/ios/MASTG-TOOL-
0074/
https://idevicecentral.com/ios-jailbreak-tool-finder/
https://redfoxsec.com/blog/sensitive-data-exposure-in-
local-storage-ios/
THANK YOU
Twitter
https://twitter.com/BawseOne
Linkedin
https://www.linkedin.com/in/abidashariff/

More Related Content

PDF
iOS Application Security And Static Analysis.pdf
ODP
Web Application Firewall
PPTX
Mobile security
ODP
Mobile Apps Security Testing -1
PDF
Information Security Awareness for everyone
PPTX
Secure Software Development Lifecycle
 
PDF
Networking Fundamental Course by Haris Chughtai
PPTX
Cyber security-presentation
iOS Application Security And Static Analysis.pdf
Web Application Firewall
Mobile security
Mobile Apps Security Testing -1
Information Security Awareness for everyone
Secure Software Development Lifecycle
 
Networking Fundamental Course by Haris Chughtai
Cyber security-presentation

What's hot (20)

PPTX
Iot forensics
PPTX
Cyber security
PPTX
Security for Healthcare Devices – Will Your Device Be Good Enough?
PDF
NTXISSACSC4 - Layered Security / Defense in Depth
PDF
Hard Disk Encryptions
PPTX
Cyber kill chain
PPTX
Cyber security and AI
PPTX
Pentesting Android Applications
PDF
Security Awareness Training
PPTX
Security awareness
PDF
Application Security - Your Success Depends on it
PPT
PDF
SIEM and Threat Hunting
PPT
Data loss prevention (dlp)
PDF
Best Practices for Security Awareness and Training
PDF
Threat Hunting with Data Science
PPTX
Cyber security
PPTX
Cyber security system presentation
PDF
Building the Security Operations and SIEM Use CAse
PPTX
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Iot forensics
Cyber security
Security for Healthcare Devices – Will Your Device Be Good Enough?
NTXISSACSC4 - Layered Security / Defense in Depth
Hard Disk Encryptions
Cyber kill chain
Cyber security and AI
Pentesting Android Applications
Security Awareness Training
Security awareness
Application Security - Your Success Depends on it
SIEM and Threat Hunting
Data loss prevention (dlp)
Best Practices for Security Awareness and Training
Threat Hunting with Data Science
Cyber security
Cyber security system presentation
Building the Security Operations and SIEM Use CAse
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Ad

Similar to IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx (20)

PPTX
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
PPTX
iOS-Application-Security-iAmPr3m
PPTX
Top 10 Mobile Hacking Tools – 2025 Edition
PDF
Ruxmon April 2014 - Introduction to iOS Penetration Testing
PDF
OWASP Melbourne - Introduction to iOS Application Penetration Testing
PPTX
Hands-On iOS Application Penetraion Testing.pptx
PDF
OWASP for iOS
PDF
Mobile Forensics on a Shoestring Budget
PDF
2a Analyzing iOS Apps Part 1
PDF
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PDF
Hacking and Securing iOS Applications
PDF
Mobile operating system
PDF
CNIT 128 2. Analyzing iOS Applications (Part 1)
PDF
Crack ios firmware-nlog2n
PPTX
100 effective software testing tools that boost your Testing
PPTX
Pentesting iPhone applications
PPTX
IOS security
PDF
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Unlocking-iOS-A-Hackers-Guide-to-App-Testing.pptx
iOS-Application-Security-iAmPr3m
Top 10 Mobile Hacking Tools – 2025 Edition
Ruxmon April 2014 - Introduction to iOS Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
Hands-On iOS Application Penetraion Testing.pptx
OWASP for iOS
Mobile Forensics on a Shoestring Budget
2a Analyzing iOS Apps Part 1
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Android security and penetration testing | DIVA | Yogesh Ojha
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications
Mobile operating system
CNIT 128 2. Analyzing iOS Applications (Part 1)
Crack ios firmware-nlog2n
100 effective software testing tools that boost your Testing
Pentesting iPhone applications
IOS security
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Ad

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Modernising the Digital Integration Hub
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Chapter 5: Probability Theory and Statistics
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
STKI Israel Market Study 2025 version august
O2C Customer Invoices to Receipt V15A.pptx
Assigned Numbers - 2025 - Bluetooth® Document
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
observCloud-Native Containerability and monitoring.pptx
Architecture types and enterprise applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Modernising the Digital Integration Hub
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Chapter 5: Probability Theory and Statistics
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Web App vs Mobile App What Should You Build First.pdf
STKI Israel Market Study 2025 version august

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx

  • 1. IOS PENTESTING: A BEGINNER'S PRACTICAL GUIDE By Abida Shariff Lead Security Engineer
  • 2. WHOAMI I’m Abida Shariff Lead Security Engineer at Redsentry Web Application, iOS & Android Researcher OSCP, eJPT, CEH Certified Just a curious geek
  • 3. Jailbroken Devices and iOS Versions Jailbreaking Software iOS Version Support Supported Devices Notes Checkra1n Up to iOS 14.8.1 Up to iPhone X (A11 chip and older) Uses checkm8 exploit Palera1n iOS 15.0 to iOS 17.4 A11 chips and older Based on checkm8 exploit Dopamine iOS 15.0 to iOS 16.6.1 A12 to A16 and M1 to M2 chips Focuses on newer devices, does not support latest versions beyond iOS 16.6.1 Emulators: Tools like Corellium offer cloud-based iOS environments for security testing without needing physical devices.
  • 4. Tools: A Pentester’s Arsenal Frida: Objection: Otool: ● Dynamic instrumentation toolkit ● Allows injection of scripts into application ● Explore and modify runtime operations ● Package: build.frida.re ● Runtime mobile exploration toolkit ● Uses Frida ● Assesses security posture of mobile applications ● Inspecting the structure and contents of executable files and libraries ● Analyzing binary dependencies and linked frameworks ● Debugging and reverse engineering applications
  • 5. IPA File Structure Payload Folder ● Main directory of the IPA file ● Contains all executable and non-executable files for the app app Folder ● Contains the actual iOS application folder (.app directory) ● Includes the executable file of the app (e.g., AppName.app) ● Contains resources like images, sounds, and other assets Info.plist ● Key file within the .app folder ● Contains metadata about the application Version Display name SDK version ● Other configuration details necessary for the iOS system
  • 6. Extracting and Exploring IPA Files Leverage powerful tools like IMazing, AppIndex, IPAtool and via Filza to effectively extract IPA files from your iOS devices, opening the door to deeper security analysis and reverse engineering. Small Demo….
  • 7. Installing IPA Files on Jailbroken Devices To install IPA files on iOS devices, several tools can be used: 3uTools ● Windows and Mac users ● Manages iOS devices ● Features: IPA installation, jailbreaking, device management Sideloadly ● Compatible with Windows and Mac ● Sideloads IPA files using an Apple ID ● Facilitates installation of apps not available on the App Store TrollStore ● Install IPA’s directly from the device or via a computer ● No revokes or re-signing required
  • 8. Jailbreak Detection and SSL Pinning Bypass Bypass Jailbreak Detection ● Hook into app's code ● Disable or alter jailbreak detection mechanisms Bypass SSL Pinning ● Intercept and manipulate traffic ● Hook into app's SSL handling routines
  • 9. Static Analysis of IPA Files 1 MobSF: Comprehensive App Scanning Leverage the Mobile Security Framework (MobSF) to perform in-depth static analysis on IPA files. Uncover code vulnerabilities, sensitive data leaks, and potential security weaknesses. 2 Otool: Examining Binary Structure Use the powerful otool utility to inspect the structure and contents of the IPA files compiled binary. Identify libraries, and other valuable information for security assessment. 3 Frida: Dynamic Instrumentation Integrate the Frida framework to dynamically hook into the running iOS app and observe its behavior, intercept function calls, and uncover hidden functionality. 4 Plist Editor Pro: View Plist Files Plist Editor Pro is a tool used for viewing plist files, to store settings and configuration information.
  • 10. Local Storage Local storage refers to the various methods an application uses to store data directly on a device. Key local storage mechanisms include NSUserDefaults, used for storing user preferences and small pieces of data, and Keychain, designed for securely storing sensitive information such as passwords and tokens.