YoVDO

iOS Application Hacking - Understanding IPA Structure and Mach-O Binaries

Offered By: HackerOne via YouTube

Tags

iOS Security Courses Reverse Engineering Courses

Course Description

Overview

Explore the fundamentals of iOS application hacking in this introductory video. Delve into the structure of IPA files, examine the components of the Mach-O binary format, and learn simple techniques to assess an application's functionality. Gain insights into app package contents, including the Info.plist file, App Store encryption, and methods for decrypting binaries. Discover how to uncover hidden interfaces, sensitive API keys, passwords, and private keys within iOS apps. Learn to extract class information from Mach-O binaries and understand the implications of insufficient symbol stripping. Explore additional file types like NSKeyedArchiver and their significance in iOS app analysis. Perfect for aspiring ethical hackers and security professionals looking to enhance their iOS application security knowledge.

Syllabus

Intro
What's in an app? • ipa file • Zip file for app distribution Standard directory structure
Info.plist Located under app • Property list (plist) format
App Store encryption • All App Store apps have FairPlay encryption applied
Decrypting App Store binaries • Basic process
Finding secrets • Hidden interfaces Sensitive API keys Passwords Private keys
Dumping class information • Mach-o binaries contain information about Objective-C classes and Swift types • Possible to reconstruct the class
Lack of symbol stripping • Local paths to original source files • Can disclose usernames, project context Usernames could lead to source repos • Help identify libraries/frameworks
Lack of symbol stripping • Local paths to original source files Can disclose usernames, project context Usernames could lead to source repos • Help identify libraries/frameworks
Other file types • NSKeyedArchiver


Taught by

HackerOne

Related Courses

Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning
Learning Mobile Device Security
LinkedIn Learning
Supporting Face ID and Touch ID Authentication in iOS Using Swift 5
Pluralsight
CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent
Ethical Hacking: Hacking Mobile Platforms
Pluralsight