iOS Application Hacking - Understanding IPA Structure and Mach-O Binaries

iOS Application Hacking - Understanding IPA Structure and Mach-O Binaries

HackerOne via YouTube Direct link

Info.plist Located under app • Property list (plist) format

3 of 10

3 of 10

Info.plist Located under app • Property list (plist) format

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

iOS Application Hacking - Understanding IPA Structure and Mach-O Binaries

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What's in an app? • ipa file • Zip file for app distribution Standard directory structure
  3. 3 Info.plist Located under app • Property list (plist) format
  4. 4 App Store encryption • All App Store apps have FairPlay encryption applied
  5. 5 Decrypting App Store binaries • Basic process
  6. 6 Finding secrets • Hidden interfaces Sensitive API keys Passwords Private keys
  7. 7 Dumping class information • Mach-o binaries contain information about Objective-C classes and Swift types • Possible to reconstruct the class
  8. 8 Lack of symbol stripping • Local paths to original source files • Can disclose usernames, project context Usernames could lead to source repos • Help identify libraries/frameworks
  9. 9 Lack of symbol stripping • Local paths to original source files Can disclose usernames, project context Usernames could lead to source repos • Help identify libraries/frameworks
  10. 10 Other file types • NSKeyedArchiver

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.