Skip to content

Welcome to My-iOS-Pentesting-Cheatsheet! This repository serves as my personal guide and reference for iOS penetration testing.

Notifications You must be signed in to change notification settings

Abhinandan-Khurana/My-iOS-Pentesting-Cheatsheet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

My-iOS-Pentesting-Cheatsheet

Welcome to My-iOS-Pentesting-Cheatsheet! This repository serves as my personal guide and reference for iOS penetration testing. Whether you're a beginner or an experienced pentester, I hope this cheatsheet will aid you in your iOS security assessments.

Note: I am continuously learning and updating this cheatsheet, so contributions and suggestions are highly welcome!

Table of Contents

Introduction

iOS penetration testing involves assessing the security of iOS applications and devices to identify vulnerabilities that could be exploited by malicious actors. This cheatsheet compiles essential commands, tools, and methodologies to streamline your pentesting workflow.

Setup & Installation

Prerequisites

  • macOS: Required for most iOS pentesting tools.
  • Xcode: Install from the Mac App Store.
  • Homebrew: Package manager for macOS. Install with:
    /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

Installing Essential Tools

  1. Homebrew:

    /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
  2. Burp Suite:

    brew install --cask burp-suite
  3. Frida:

    brew install frida
  4. Objection:

    brew install objection
  5. Cycript:

    brew install cycript

Tools

1. Burp Suite

A powerful web vulnerability scanner and proxy tool.

  • Usage: Intercept and modify traffic between the iOS app and the server.

2. Frida

A dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

  • Usage: Inject scripts into iOS apps to bypass security mechanisms.

3. Objection

Runtime mobile exploration toolkit powered by Frida.

  • Usage: Jailbreak-free mobile exploration.

4. Cycript

A tool that combines JavaScript and Objective-C.

  • Usage: Inspect and modify iOS apps at runtime.

5. Xcode

Apple's IDE for macOS, used for developing iOS applications.

  • Usage: Reverse engineer and debug iOS applications.

Common Techniques

Reconnaissance

  • Identify Target App:
    ideviceinstaller -l
  • Extract IPA:
    ideviceinstaller -u <UDID> -i <AppName>

Exploitation

  • Bypass SSL Pinning with Frida:

    // frida script to bypass SSL pinning
  • Hooking Functions:

    frida -U -f com.target.app -l hook.js --no-pause

Post-Exploitation

  • Dumping Application Data:
    objection -U -g com.target.app explore
  • Extracting Sensitive Information:
    cycript -p <PID>

Resources

Contributing

Contributions are what make the open-source community such an amazing place to learn, inspire, and create. **Any contributions you make are greatly appreciated.

How to Contribute

  1. Fork the Repository
  2. Create a Branch: git checkout -b feature/AmazingFeature
  3. Commit Your Changes: git commit -m 'Add some AmazingFeature'
  4. Push to the Branch: git push origin feature/AmazingFeature
  5. Open a Pull Request

Guidelines

  • Ensure Code Quality: Follow consistent coding standards and include comments where necessary.
  • Update Documentation: If you add new features or tools, update the README accordingly.
  • Report Issues: Use the Issues section to report bugs or request features.

Happy Pentesting! 🔐📱

About

Welcome to My-iOS-Pentesting-Cheatsheet! This repository serves as my personal guide and reference for iOS penetration testing.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published