Jailbreak device:
Latest version of iOS (currently it's 9.1) can't be jailbreak
Setting up mobile auditing platform
Cycript allows developers to explore and modify running applications on either iOS or Mac OS X using a hybrid of Objective-C++ and JavaScript syntax through an interactive console that features syntax highlighting and tab completion.
Why is it required for Security Testing?
How does it work?
Data injection attacks are as real in mobile apps as they are in web apps, although the attack scenarios tend to differ (e.g., exploiting URL schemes to send premium text messages or toll phone calls).
SQL Injection Example
Class-dump-z Installation | 1. Go to https://code.google.com/p/networkpx/wiki/class_dump_z and copy the download link 2. SSH into device and run this command: wget <<class-dump-z download link>> 3. Once this is done, go inside the folder iphone_armv6 and copy the class-dump-z executable into /usr/bin directory |
Keychain | 1. SSH your device and run this command: wget https://github.com/ptoomey3/Keychain-Dumper/archive --no-check-certificate 2. Navigate inside Keychain_Dumper directory and run the executable by using the command ./keychain_dumper |
Cycript | 1. Go to http://www.cycript.org/debs/ and download the latest deb file 2. Copy the package to your device and install it using dpkg with this command: dpkg -i <<deb_package_name>> 3. Once the package is installed run cycript in terminal |
Tools
Commands
SSH | ssh root@<<device_ip_address>> password: alpine |
Copy over Shell | scp <<source_path>> root@<<device_ip_address>><<destination_path>> |
Convert plist to xml | plutil -convert xml1 <<plist_file>> |
Find application PID | a. ps aux | grep "app_name" b. ps -u mobile | grep "app_name" |
Sqlite | Sqlite3 <<sqlite_db>> |
Extract .tar files | tar -xvzf <<tar_file>> |
Thank you