Completed
Decrypting App Store binaries • Basic process
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
iOS Application Hacking - Understanding IPA Structure and Mach-O Binaries
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What's in an app? • ipa file • Zip file for app distribution Standard directory structure
- 3 Info.plist Located under app • Property list (plist) format
- 4 App Store encryption • All App Store apps have FairPlay encryption applied
- 5 Decrypting App Store binaries • Basic process
- 6 Finding secrets • Hidden interfaces Sensitive API keys Passwords Private keys
- 7 Dumping class information • Mach-o binaries contain information about Objective-C classes and Swift types • Possible to reconstruct the class
- 8 Lack of symbol stripping • Local paths to original source files • Can disclose usernames, project context Usernames could lead to source repos • Help identify libraries/frameworks
- 9 Lack of symbol stripping • Local paths to original source files Can disclose usernames, project context Usernames could lead to source repos • Help identify libraries/frameworks
- 10 Other file types • NSKeyedArchiver