Summary

In this chapter, you learned how to set up iDevice and which utilities to install on iDevice in order to perform iOS app pentesting. The key point to remember is to not use a jailbroken device in production. You can have spare devices that are only used for iOS penetration testing. This pentesting device will only have the needed utilities, target applications, and not any other sensitive data. You are now ready with the setup and target applications.

In the next chapter, we will study how to exploit vulnerabilities in iOS application using our lab setup.

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.