Exploring Info.plist: Essential Knowledge for iOS Reverse Engineering
In this video, we dive into the Info.plist and discover the relevant sections for iOS Reverse Engineering and security analysis. We also write a quick python script to manually decode binary plists!
—
Timestamp:
00:00 Intro
00:49 Filza File Manager Example
02:20 Binary Property List
05:15 Reading Plist Data
07:14 App Transport Security
09:42 CFBundleURLTypes
11:32 XML plist
13:00 Usage Descriptions
13:52 Recap
—
Links Mentioned in Video:
iOS Reverse Engineering Wiki:
https://github.com/LaurieWired/iOS_Reverse_Engineering
—
laurieWIRED Twitter:
Tweets by lauriewired
laurieWIRED Website:
http://lauriewired.com
laurieWIRED Github:
https://github.com/LaurieWired
laurieWIRED HN:
https://news.ycombinator.com/user?id=lauriewired
laurieWIRED Reddit:
https://www.reddit.com/user/LaurieWired
by LaurieWired
linux foundation
Hi Laurie! Please do a series about pentesting IOS applications!
Thanks from Brazil!
cool video
For registering URIs, can a new app install (regardless of malicious intent) take over a different apps registered URI, or would it function like Android which prompts the user to select the preferred app? I'm an Android user, not Apple, which is why I'm asking.
Getting better and better always! Thank you so much for sharing.
i am the 1000th view, love you laurie
I'm literally 30 seconds in, but I want to say I always love how the Lain references and the Apple look is omnipresent <3 Thanks for your vibes. On top of being top notch tech content
I would love a series/playlist on iOS type content ❤
First
5:12 thats what she said about my Plist too ☺️
Helpful Thank’s
Phone
Awesome 👍👍👍
Thanks for the video ❤