From the course: Ethical Hacking: Mobile Devices and Platforms
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
iOS applications and vulnerabilities - iOS Tutorial
From the course: Ethical Hacking: Mobile Devices and Platforms
iOS applications and vulnerabilities
- [Instructor] An iOS application interacts only with the directories inside its sandbox. During installation, iOS generates a UUID and creates a number of container directories for the application inside the sandbox directory. Each container directory has a specific role. The Bundle Container holds what's known as the application bundle, and the Data Container holds runtime data for both the application and the user. The Data Container is further divided into a number of sub-folders that the application can use to sort and organize its data. The application bundle is a directory called the application name with .app appended. For example, Batman.app. This directory contains the application and its resources. For security purposes, this directory has signed its installation time, and any changes to the directory will prevent the application launching. The Data Container is a collection of data folders used by the application, including three standard folders. The Documents folder is…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
iOS applications and vulnerabilities4m 40s
-
(Locked)
Securing iOS applications by design4m 52s
-
(Locked)
Jailbreaking for command-line access6m 45s
-
(Locked)
More jailbreak and extractor tools1m 42s
-
(Locked)
Preparing to test iOS applications3m 45s
-
(Locked)
Extracting properties and class headers5m 28s
-
(Locked)
Disassembling iOS executable code5m 36s
-
(Locked)
Advancing into dynamic analysis of iOS6m 25s
-
(Locked)
-
-