Ios PT
Ios PT
JailProtect Tweak
https://notsosecure.com/bypassing-
jailbreak-detection-ios
IDA pro
Tools and application
Heeper IPA reverse engineering
Download Apple File Conduit 2 Tweak If links performs an action the check for
Bypass UDID Restriction Custom URL Schemes CSRF
Download AppSync Unified Tweak
Hidden Functionality Auth Bypass
.plist files
Is jail break detection present
Device/App logs
Check if app stores sensitive data Is hecking detection in place hook functions
unencrypted
Volatile Memory Is update required if newer version of app
is available?
NSUserDefaults
does app has min set of permission
SQLite | Cache Firebase | Realm
Is tempering possible Patch functions
Check if UIPasteboard was used IOS PT Client side protection and
is it possible to attach LLDB
Sensitive data in backups Hardening
Are sensitive methods obfuscated?
Sensisitve data in text fields Insecure Data Storage Oofuscation
Is Central Flow Graph obfuscation
Are screenshots allowed on sensitive implemented?
screen
are debug code or symbols strpped
is Sensitive data removed from snapshot
when app is minimized Are exceptions handled correctly
Navigate to var/mobile/Library/Keyboard/ Is Keyboard cache disabled for sensitive Does app use native libs?
Use command: strings dynamic-lexicon.dat
en-dynamic.im data?
Unzip folder and open it then change the Dumping IOS Key Chain
permission using chmod