Chapter 2. Setting up Lab for iOS App Pentesting

 

"If I had eight hours to chop down a tree, I'd spend six hours sharpening my axe."

 
 --Abraham Lincoln

We are now aware about the basics of iOS app development and iOS security concepts. Now, let's set up the battlefield for penetration testing of iOS applications.

In this chapter, we will look at the following topics:

  • Need for jailbreaking
  • Hardware and software requirements
  • Jailbreaking iDevice
  • Connecting with iDevice
  • Installing utilities on iDevice
  • Pentesting using iOS Simulator

Need for jailbreaking

As studied in the previous chapter, iOS itself has a lot of security features. Neither installing any app outside of App Store nor accessing its filesystem by default is allowed by iOS.

To conduct a security ...

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.