Book Image

Learning iOS Penetration Testing

By : Swaroop Yermalkar
Book Image

Learning iOS Penetration Testing

By: Swaroop Yermalkar

Overview of this book

iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This book will show you how to conduct a wide range of penetration tests on iOS devices to uncover vulnerabilities and strengthen the system from attacks. Learning iOS Penetration Testing discusses the common vulnerabilities and security-related shortcomings in an iOS application and operating system, and will teach you to conduct static and dynamic analysis of iOS applications. This practical guide will help you uncover vulnerabilities in iOS phones and applications. We begin with basics of iOS security and dig deep to learn about traffic analysis, code analysis, and various other techniques. Later, we discuss the various utilities, and the process of reversing and auditing.
Table of Contents (17 chapters)
Learning iOS Penetration Testing
Credits
Foreword – Why Mobile Security Matters
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Converting iDevice to a pentesting device


Have you ever thought of using your pocket device as a pentesting device? Yeah, it's possible to use your iDevice as a pentesting device. If you are a pentester, then you can run the most used security tools on iDevice itself. You can use your iDevice for the purposes of scripting, vulnerability assessment, and penetrating testing of a network, web, and wireless with certain limitations.

Let's follow the given steps to use your iDevice as a pentesting device.

  1. You can execute Python scripts right from your iDevice by installing Python and Terminal on it. You can install Python and Terminal from Cydia. Terminal that is installed via Cydia is same as your Linux terminal, where you execute commands:

  2. You can also use nmap from your iDevice to find open ports of target system, service fingerprinting, and so on:

  3. Have you ever cracked a Wi-Fi password? If yes, then you can also use the most popular wireless penetration testing tool, Aircrack-ng, on your iDevice...