✨
Tech Stuff
  • Welcome
  • Threat Hunting
    • Learning ETW
      • Logman
      • SilkETW
      • Apply ETW to Windows Event (1)
    • Learning win32evtlog in python
  • Attack Simulation
    • Atomic Red Team
  • Tools
    • Windows Events Providers Explorer
    • FRIDA for iOS app penetration testing
  • Windows Security
    • User Account Control (UAC)
      • UAC Bypass
  • Windows OS Penetration Testing
    • Metasploit
    • PowerShell
    • Bloodhound
  • Unorganized Python
  • Python - pexpect
  • Python - subprocess for Windows
  • Parsing evtx to json
  • Python - Pykd
  • Workflow
    • Kali Linux on Docker
Powered by GitBook
On this page
  • Required Tools
  • Preparation
  • Basic Usage
  • Check device connectivity
  • List installed application
  • Attach to a process

Was this helpful?

  1. Tools

FRIDA for iOS app penetration testing

This page is going to document all my FRIDA hooking journey against iOS application

Required Tools

  1. Frida

    let you inject snippets of JS

  2. Objection

    a runtime mobile exploration toolkit, help you to do the basic security assesment, such as disable cert-pin.

Preparation

Get your pentest machine with frida and objection

pip3 install frida-tools
pip3 install objection

Basic Usage

Check device connectivity

frida-ls-devices

List installed application

frida-ps -Uai #List running applications

Attach to a process

Inject objection into the process, it gives you a set of toolkits provided by objection

objection -g <com.client.xxx> explore
PreviousWindows Events Providers ExplorerNextUser Account Control (UAC)

Last updated 4 years ago

Was this helpful?