Book Image

Mastering Metasploit

By : Nipun Jaswal
Book Image

Mastering Metasploit

By: Nipun Jaswal

Overview of this book

Table of Contents (17 chapters)
Mastering Metasploit
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Post-exploitation on Apple iDevices


Apple has been known for its secure services deployed in its iDevices, which are iPhone, iPad, and so on. Testing iDevices from the perspective of a penetration tester is troublesome and complex. However, if an iDevice is jail broken, this task becomes much easier to perform.

Our discussion here will focus on testing an iDevice in a jail broken environment. We assume that we have the SSH access to the target by fate or by exploiting an SSH vulnerability in the iDevice.

Tip

You can learn about exploiting the SSH service at http://www.youtube.com/watch?v=1JmUIyfWEzc

Exploiting iOS with Metasploit

After we have seen how to exploit the SSH vulnerability from the preceding resource, let's move on and try to log in to the SSH of the device.

However, before we do that, let's try creating the malicious payload that will actually exploit the iOS. Let's launch msfvenom, a tool for generating encoded payloads.

Generally, we use msfvenom to produce malicious payloads and...