OPERATING SYSTEMSOS Linux

Exploring Info.plist: Essential Knowledge for iOS Reverse Engineering

In this video, we dive into the Info.plist and discover the relevant sections for iOS Reverse Engineering and security analysis. We also write a quick python script to manually decode binary plists!

Timestamp:
00:00 Intro
00:49 Filza File Manager Example
02:20 Binary Property List
05:15 Reading Plist Data
07:14 App Transport Security
09:42 CFBundleURLTypes
11:32 XML plist
13:00 Usage Descriptions
13:52 Recap

Links Mentioned in Video:

iOS Reverse Engineering Wiki:
https://github.com/LaurieWired/iOS_Reverse_Engineering


laurieWIRED Twitter:

laurieWIRED Website:
http://lauriewired.com

laurieWIRED Github:
https://github.com/LaurieWired

laurieWIRED HN:
https://news.ycombinator.com/user?id=lauriewired

laurieWIRED Reddit:
https://www.reddit.com/user/LaurieWired

source

by LaurieWired

linux foundation

13 thoughts on “Exploring Info.plist: Essential Knowledge for iOS Reverse Engineering

  • Hi Laurie! Please do a series about pentesting IOS applications!
    Thanks from Brazil!

  • For registering URIs, can a new app install (regardless of malicious intent) take over a different apps registered URI, or would it function like Android which prompts the user to select the preferred app? I'm an Android user, not Apple, which is why I'm asking.

  • I'm literally 30 seconds in, but I want to say I always love how the Lain references and the Apple look is omnipresent <3 Thanks for your vibes. On top of being top notch tech content

  • I would love a series/playlist on iOS type content ❤

Comments are closed.