O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Post-exploitation on Apple iDevices

Apple has been known for its secure services deployed in its iDevices, which are iPhone, iPad, and so on. Testing iDevices from the perspective of a penetration tester is troublesome and complex. However, if an iDevice is jail broken, this task becomes much easier to perform.

Our discussion here will focus on testing an iDevice in a jail broken environment. We assume that we have the SSH access to the target by fate or by exploiting an SSH vulnerability in the iDevice.

Tip

You can learn about exploiting the SSH service at http://www.youtube.com/watch?v=1JmUIyfWEzc

Exploiting iOS with Metasploit

After we have seen how to exploit the SSH vulnerability from the preceding resource, let's move on and try to log in to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required