Dynamic Analysis
Connect device to the laptop
# get app name
frida-ps -Uai
objection -g "APP" explore
# view the environment variables for the app
env
# 1. Sensitive information
cd <env>
cd Documents
ios plist userInfo.plist
env
cd Library
cd Preferences
ios plist can com.highaltitidehacks.DVIAswiftv2.plist
# In keychain
ios keychain dump_raw
# SQLite
cd Library
cd Application\ Support
sqlite connect Model.sqlite
.tables # etc
# Cookies
ios cookies get --json
# Device Logs
idevicesyslog -u idevice_id | grep "application name"
# 2. Broken Cryptography
objection -g "APP" explore
ios monitor crypt
# 3. Local Authentication using Keychain
objection -g "APP" explore
ios ui biometrics_bypass --quiet
# 4. Jailbreak detection bypass
# Find the jailbreak detection classes :
ios hooking search jail
# Use HideJB | Close the running app after starting HideJB
# Settings > HideJB preferences > Select Apps > Toggle on the app name
# or
ios jailbreak disable --quiet
# 5. SSL Pinning Bypass
# SSL Kill Switch 2
# Settings > SSL KILL SWITCH 2 > Toggle on "Disable certificate validation"
# or
ios sslpinning disable
# 6. Monitor the logs
# on host
idevicesyslog -p 1337
Last updated