IOS Application Security Testing Cheat Sheet
IOS Application Security Testing Cheat Sheet
DRAFT CHEAT SHEET - WORK IN PROGRESS
Introduction
This cheat sheet provides a checklist of tasks to be performed when testing an iOS application.
When assessing a mobile application several areas should be taken into account: client software, the communication channel and the server side infrastructure.
Testing an iOS application usually requires a jailbroken device. (A device that not pose any restrictions on the software that can be installed on it.)

Information gathering
- Observe application behavior
- Determine the application’s data states (at rest, in transit or on display) and sensitivity
- Identify access methods
- Identify what frameworks are in use
- Identify server side APIs that are in use
- Identify what protocols are in use
- Identify other applications or services with which the application interacts
- Decrypt Appstore binaries: the .ipa will be decrypted at runtime by the kernel’s mach loader. Cydia has several applications available: Crackulous, AppCrack and Clutch. Also, you can use GDB. The “cryptid” field of the LC_ENCRYPTION_INFO identifies if the application is encrypted or not. Use otool –l <app name> | grep –A 4 LC_ENCRYPTION_INFO
- Determine the architecture the application was compiled for: otool –f <app name> or lipo -info <app>.
- Get information about what functions, classes and methods are referenced in the application and in the dynamically loaded libraries. Use nm <app name>
- List the dynamic dependencies. Use otool –L <app name>
- Dump the load commands for the application. Use otool –l <app name>
- Dump the runtime information from the compiled application. Identify each class compiled into the program and its associated methods, instance variables and properties. Use class-dump-z <app name>. That can be put that into a .h file which can be used later to create hooks for method swizzling or to simply make the methods of the app easier to read.
- Dump the keychain using dump_keychain to reveal application specific credentials and passwords if stored in the keychain.
Determine the security features in place:
- Locate the PIE (Position Independent Executable) - an app compiled without PIE (using the “–fPIE –pie” flag) will load the executable at a fixed address. Check this using the command: otool –hv <app name>
- Stack smashing protection - specify the –fstack-protector-all compiler flag. A “canary” is placed on the stack to protect the saved base pointer, saved instruction pointer and function arguments. It will be verified upon the function return to see if it has been overwritten. Check this using: otool –I –v <app name> | grep stack . If the application was compiled with the stack smashing protection two undefined symbols will be present: “___stack_chk_fail” and “___stack_chk_guard”.
Application traffic analysis
- Analyze error messages
- Analyze cacheable information
- Transport layer security (TLS version; NSURLRequest object )
- Attack XML processors
- SQL injection
- Privacy issues (sensitive information disclosure)
- Improper session handling
- Decisions via untrusted inputs
- Broken cryptography
- Unmanaged code
- URL Schemes
- Push notifications
- Authentication
- Authorization
- Session management
- Data storage
- Data validation (input, output)
- Transport Layer protection – are the certificates validated, does the application implement Certificate Pinning
- Denial of service
- Business logic
- UDID or MAC ID usage (privacy concerns)
Runtime analysis
- Disassemble the application (gdb)
- Analyze file system interaction
- Use the .h file generated with class-dump-z to create a method swizzling hook of some interesting methods to either examine the data as it flow through or create a "stealer" app.
- Analyze the application with a debugger (gdb): inspecting objects in memory and calling functions and methods; replacing variables and methods at runtime.
- Investigate CFStream and NSStream
- Investigate protocol handlers (application: openURL - validates the source application that instantiated the URL request) for example: try to reconfigure the default landing page for the application using a malicious iframe.
- Buffer overflows and memory corruption
- Client side injection
- Runtime injections
- Having access to sources, test the memory by using Xcode Schemes
Insecure data storage
- Investigate log files(plugging the device in and pulling down logs with Xcode Organizer)
- Insecure data storage in application folder (var/mobile/Applications), caches, in backups (iTunes)
- Investigate custom created files
- Analyze SQLlite database
- Investigate property list files
- Investigate file caching
- Insecure data storage in keyboard cache
- Investigate Cookies.binarycookies
- Analyze iOS keychain (/private/var/Keychains/keychain-2.db) – when it is accessible and what information it contains; data stored in the keychain can only be accessible if the attacker has physical access to the device.
- Check for sensitive information in snapshots
- Audit data protection of files and keychain entries (To determine when a keychain item should be readable by an application check the data protection accessibility constants)
Tools
| Tool | Link | Description |
|---|---|---|
| Mallory proxy | http://intrepidusgroup.com/insight/mallory/ | Proxy for Binary protocols |
| Charles/Burp proxy | http://www.charlesproxy.com/ ; | Proxy for HTTP and HTTPS |
| OpenSSH | http://www.openssh.com/ | Connect to the iPhone remotely over SSH |
| Sqlite3 | http://www.sqlite.org/ | Sqlite database client |
| GNU Debugger | http://www.gnu.org/software/gdb/ | For run time analysis & reverse engineering |
| Syslogd | https://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man8/syslogd.8.html | View iPhone logs |
| Tcpdump | http://www.tcpdump.org/ | Capture network traffic on phone |
| Otool | http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man1/otool.1.html | Odcctools: otool – object file displaying tool |
| Cycript | http://www.cycript.org/ | A language designed to interact with Objective-C classes |
| SSL Kill switch | https://github.com/iSECPartners/ios-ssl-kill-switch | Blackbox tool to disable SSL certificate validation - including certificate pinning in NSURL |
| Plutil | http://scw.us/iPhone/plutil/ | To view Plist files |
| nm | Analysis tool to display the symbol table, which includes names of functions and methods, as well as their load addresses. | |
| sysctl | https://developer.apple.com/library/mac/#documentation/Darwin/Reference /ManPages/man8/sysctl.8.html | A utility to read and change kernel state variables |
| dump_keychain | https://github.com/emonti/iOS_app_re_tools | A utility to dump the keychain |
| Filemon | http://www.newosxbook.com/files/filemon.iOS | Monitor realtime iOS file system |
| FileDP | http://www.securitylearn.net/2012/10/18/extracting-data-protection-class-from-files-on-ios/ | Audits data protection of files |
| BinaryCookieReader | http://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py | Read cookies.binarycookies files |
| lsof ARM Binary | https://github.com/u35tpus/iosrep/tree/master/lsof | list of all open files and the processes that opened them |
| lsock ARM Binary | http://www.newosxbook.com/index.php?page=downloads | monitor socket connections |
| PonyDebugger Injected | https://github.com/dtrukr/PonyDebuggerInjected | Injected via Cycript to enable remote debugging |
| Weak Class Dump | https://raw.github.com/limneos/weak_classdump/master/weak_classdump.cy | Injected via Cycript to do class-dump (for when you cant un-encrypt the binary) |
| TrustME | https://github.com/intrepidusgroup/trustme | Lower level tool to disable SSL certificate validation - including certificate pinning (for everything else but NSURL) |
| Mac Robber | http://www.sleuthkit.org/mac-robber/download.php | C code, forensic tool for imaging filesystems and producing a timeline |
| USBMux Proxy | https://github.com/st3fan/usbmux-proxy | command line tool to connect local TCP port sto ports on an iPhone or iPod Touch device over USB. |
| iFunBox | http://www.i-funbox.com/ | Filesystem access (no jailbreak needed), USBMux Tunneler, .ipa installer |
| iNalyzer | https://appsec-labs.com/iNalyzer/ | iOS Penetration testing framework |
| removePIE | https://github.com/peterfillmore/removePIE | Disables ASLR of an application |
| snoop-it | https://code.google.com/p/snoop-it/ | A tool to assist security assessments and dynamic analysis of iOS Apps, includes runtime views of obj-c classes and methods, and options to modify those values |
| idb | https://github.com/dmayer/idb | A GUI (and cmdline) tool to simplify some common tasks for iOS pentesting and research. |
| Damn Vulnerable iOS Application | http://damnvulnerableiosapp.com/ | A purposefully vulnerable iOS application for learning iOS application assessment skills. |
| introspy | https://github.com/iSECPartners/Introspy-iOS | A security profiling tool revolved around hooking security based iOS APIs and logging their output for security analysis |
IOS Application Security Testing Cheat Sheet的更多相关文章
- iOS Application Security
文章分A,B,C,D 4个部分. A) iOS Application Security 下面介绍iOS应用安全,如何分析和动态修改app. 1)iOS Application security Pa ...
- XSS (Cross Site Scripting) Prevention Cheat Sheet(XSS防护检查单)
本文是 XSS防御检查单的翻译版本 https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sh ...
- The iOS Design Cheat Sheet 界面设计速参
http://ivomynttinen.com/blog/the-ios-7-design-cheat-sheet/ With the release of iOS 7, app designers ...
- Racket Cheat Sheet
Racket Cheat Sheet 来源 http://docs.racket-lang.org/racket-cheat/index.html?q=Racket%20Cheat%20Sheet ...
- Penetration Testing、Security Testing、Automation Testing
相关学习资料 http://www.cnblogs.com/LittleHann/p/3823513.html http://www.cnblogs.com/LittleHann/p/3828927. ...
- [转]Swift Cheat Sheet
原文:http://kpbp.github.io/swiftcheatsheet/ A quick cheat sheet and reference guide for Apple's Swift ...
- Security Testing Basics
Security Testing BasicsSoftware security testing is the process of assessing and testing a system to ...
- [Chromium文档转载,第006章]Chrome IPC To Mojo IPC Cheat Sheet
For Developers > Design Documents > Mojo > Chrome IPC To Mojo IPC Cheat Sheet 目录 1 O ...
- XSS Cheat Sheet(basics and advanced)
XSS Cheat Sheet BASICS HTML注入 当输入位于HTML标记的属性值内或标记的外部(下一种情况中描述的标记除外)时使用.如果输入在HTML注释中,则在payload前加上&quo ...
随机推荐
- WebLogic 12c SpringMVC Jackson 冲突 java.lang.NoSuchMethodError: TypeFactory.constructParametrizedType(Ljava/lang/Class;Ljava/lang/Class;[Ljava/lang/Class;)
<?xml version="1.0" encoding="UTF-8"?> <wls:weblogic-web-app xmlns:wls= ...
- xml Schema import
first_.xsd <?xml version="1.0" encoding="UTF-8"?> <xs:schema xmlns:xs=& ...
- 盘点mysql中容易被我们误会的地方
引语:mysql作为数据库的一大主力军,到处存在于我们各种系统中,相信大家都不陌生!但是,你知道你能用不代表你知道细节,那我们就来盘点盘点其中一些我们平时不太注意的地方,一来为了有趣,二来为了不让自己 ...
- JDK版本不兼容问题之:一台机器安装多个版本的JDK
原创作品,允许转载,转载时请务必以超链接形式标明文章 原始出处 .作者信息和本声明.否则将追究法律责任.http://guojie.blog.51cto.com/59049/45964 我的机器上最开 ...
- Leetcode 303 Range Sum Query - Immutable
题意:查询一个数组在(i,j]范围内的元素的和. 思路非常简单,做个预处理,打个表就好 拓展:可以使用树状数组来完成该统计,算法复杂度为(logn),该数据结构强力的地方是实现简单,而且能完成实时更新 ...
- 从头学Android之Android布局管理:LinerLayout线性布局
LinerLayout线性布局: 这种布局方式是指在这个里面的控件元素显线性,我们可以通过setOrientation(int orientation)来指定线性布局的显示方式,其值有:HORIZON ...
- bzoj 1637: [Usaco2007 Mar]Balanced Lineup
1637: [Usaco2007 Mar]Balanced Lineup Time Limit: 5 Sec Memory Limit: 64 MB Description Farmer John ...
- spring源码 — 二、从容器中获取Bean
getBean 上一节中说明了容器的初始化,也就是把Bean的定义GenericBeanDefinition放到了容器中,但是并没有初始化这些Bean.那么Bean什么时候会初始化呢? 在程序第一个主 ...
- Log4cpp介绍及使用
Log4cpp是一个开源的C++类库,它提供了在C++程序中使用日志和跟踪调试的功能.使用log4cpp,可以很便利地将日志或者跟踪调试信息写入字符流.内存字符串队列.文件.回滚文件.调试器.Wind ...
- 一致性hash和solr千万级数据分布式搜索引擎中的应用
互联网创业中大部分人都是草根创业,这个时候没有强劲的服务器,也没有钱去买很昂贵的海量数据库.在这样严峻的条件下,一批又一批的创业者从创业中 获得成功,这个和当前的开源技术.海量数据架构有着必不可分的关 ...