In this article, I will summarise all the specifics of mobile applications and devices. This information might be valuable either for penetration testing or digital forensics.
In this article I’m trying to untangle a very confusing notion for some people (myself included) - App Transport Security.
Intro Frida is cool Templates Empty If a method needs an argument of type Context, getApplicationContext() needs to be used.
There are several tools available that perform decryption of iOS applications. iOS applications that are downloaded from AppStore are encrypted.
Debuggers gdb radare2 Other IDA Pro [Hopper Disassembler](/docs/toolkit/general/reverse-toolkit/#hopper disassembler) Static code analysis IDA Pro Hopper Disassembler radare2 Utilities Activity Analysis Jailbreaking/Rooting Something Desciption
iOS When an iDevice is started, two separate booting processes are taking place: booting of Application Processor and booting of Secure Enclave.
This is a combination of BTFM and RTFM (Blue Team Field Manual and Red Team Field Manual) for iOS devices and applications.
Options: Google Wallet, Apple Pay, Samsumg Pay, Amazon Pay, Visa Checkout and PayPal. I think there are more,
iOS Jailbreaking Types of jailbreaking Tethered jailbreaks don’t persist through reboots, so re-applying jailbreaks requires the device to be connected (tethered) to a computer during every reboot.
This is a combination of BTFM and RTFM (Blue Team Field Manual and Red Team Field Manual) for Android devices and applications.