Apple has been known for its secure services deployed in its iDevices, which are iPhone, iPad, and so on. Testing iDevices from the perspective of a penetration tester is troublesome and complex. However, if an iDevice is jail broken, this task becomes much easier to perform.
Our discussion here will focus on testing an iDevice in a jail broken environment. We assume that we have the SSH access to the target by fate or by exploiting an SSH vulnerability in the iDevice.
You can learn about exploiting the SSH service at http://www.youtube.com/watch?v=1JmUIyfWEzc
After we have seen how to exploit the SSH vulnerability from the preceding resource, let's move on and try to log in to ...