iOS Pentesting Series Part 2- Into The Battlefield..
<p>Hola Peeps,</p>
<p>Recently, much to my surprise, I’ve managed to wrap up the Part-2 section of my iOS Pentesting series, all thanks to my incredibly efficient and intelligent self. Please note, just a heads up, I’ve kept the theory parts brief; if you’re craving more in-depth knowledge, feel free to consult dear ChatGPT. xD</p>
<p>Btw, If you haven’t gone through the Part-1 yet, here it is</p>
<p><a href="https://kishorbalan.medium.com/start-your-first-ios-application-pentest-with-me-part-1-1692311f1902" rel="noopener">Start your first iOS Application Pentest with me.. (Part- 1) | by Kishor balan | Medium</a></p>
<h2>IPA file Anatomy</h2>
<p>Rename the IPA to ZIP and extract it. Let’s analyze some of the important the components.</p>
<p><img alt="" src="https://miro.medium.com/v2/resize:fit:604/1*rV--L9Mwwk8Od-5ekqResg.png" style="height:218px; width:604px" /></p>
<p><img alt="" src="https://miro.medium.com/v2/resize:fit:700/1*jPYfyOWy5Q9ADnpq9X1AUA.png" style="height:551px; width:700px" /></p>
<p><strong>Frameworks</strong>: This is one of the important directory that we can take a look. This folder may contains extrernal frameworks that are implemented within the application (Eg: Frameworks for Jailbreak detection, SSL pinning ,etc)</p>
<p><a href="https://kishorbalan.medium.com/ios-pentesting-series-part-2-into-the-battlefield-f17ed2778890"><strong>Visit Now</strong></a></p>
<p> </p>