<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Ios on Hexploitable</title>
    <link>https://hexplo.it/tags/ios/</link>
    <description>Recent content in Ios on Hexploitable</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 10 Aug 2016 13:54:40 +0000</lastBuildDate>
    <atom:link href="https://hexplo.it/tags/ios/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Brace yourselves: ATS is coming</title>
      <link>https://hexplo.it/post/ats-enforcement/</link>
      <pubDate>Wed, 10 Aug 2016 13:54:40 +0000</pubDate>
      <guid>https://hexplo.it/post/ats-enforcement/</guid>
      <description>&lt;h2 id=&#34;application-transport-security&#34;&gt;Application Transport Security&lt;/h2&gt;&#xA;&lt;p&gt;Since HTTP is a plaintext protocol and therefore creates inherent security and privacy concerns when used by applications - Apple has decided that it is finally time to start treating the secure alternative, HTTPS, as the de facto web protocol for iOS mobile apps. At WWDC this year, Apple rightly pointed out that simply &amp;ldquo;enabling&amp;rdquo; HTTPS does not necessarily mean that you are secure. There are many ways in which HTTPS can be improperly configured resulting in the use of insecure connections.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security updates in iOS 10</title>
      <link>https://hexplo.it/post/security-updates-in-ios-10/</link>
      <pubDate>Fri, 24 Jun 2016 15:17:44 +0000</pubDate>
      <guid>https://hexplo.it/post/security-updates-in-ios-10/</guid>
      <description>&lt;p&gt;Apple recently announced iOS 10 which includes many security and privacy related changes. This article aims to talk about some of the significant changes since iOS 9.&lt;/p&gt;&#xA;&lt;h2 id=&#34;network-security&#34;&gt;Network Security&lt;/h2&gt;&#xA;&lt;p&gt;Since HTTP is a plaintext protocol and therefore creates inherent security and privacy concerns when used, Apple has now decided that it is finally time to start treating HTTPS as the de facto web protocol. At WWDC this year, Apple rightly pointed out that simply &amp;ldquo;enabling&amp;rdquo; HTTPS does not necessarily mean that you are secure. There are many ways in which HTTPS can be improperly configured resulting in the use of insecure connections.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Recent Tool Contributions</title>
      <link>https://hexplo.it/post/recent-tool-contributions/</link>
      <pubDate>Tue, 24 Nov 2015 11:43:52 +0000</pubDate>
      <guid>https://hexplo.it/post/recent-tool-contributions/</guid>
      <description>&lt;p&gt;So recently I made a couple of minor contributions to online iOS tools.&#xA;Whilst the contributions are tiny, it was my first experience of actually submitting merge requests to other tools. For this reason I thought I&amp;rsquo;d share them with you.&lt;/p&gt;&#xA;&lt;h2 id=&#34;1-ipainstaller&#34;&gt;1. ipainstaller&lt;/h2&gt;&#xA;&lt;p&gt;One of the changes introduced in iOS 8 was that applications are laid out differently on the device. Essentially, the application exists as multiple containers spread out across the &lt;code&gt;/private/var/mobile/&lt;/code&gt; directory.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Integrating Touch ID into your iOS applications</title>
      <link>https://hexplo.it/post/integrating-touch-id/</link>
      <pubDate>Mon, 03 Aug 2015 09:30:54 +0000</pubDate>
      <guid>https://hexplo.it/post/integrating-touch-id/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://devimages.apple.com.edgekey.net/ios8/images/touch-id-icon_2x.png&#34; alt=&#34;TouchID&#34;&gt;&#xA;&lt;em&gt;Image copyrights and trademarks belong exclusively to Apple.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;what-is-touch-id&#34;&gt;What is Touch ID?&lt;/h1&gt;&#xA;&lt;p&gt;Simply put, Touch ID is Apple&amp;rsquo;s fingerprint technology for iOS mobile devices. It allows consumers to unlock their phones and make purchases conveniently using their fingerprint(s). Furthermore, as of iOS version 8.0, Apple opened Touch ID up to developers by making APIs available for use in the SDK.&lt;/p&gt;&#xA;&lt;h3 id=&#34;biometric-opinions&#34;&gt;Biometric opinions&lt;/h3&gt;&#xA;&lt;p&gt;This post assumes you have performed your own risk assessment and are aware of the risks associated with biometric authentication technologies, and that you have decided that Touch ID is suitable for use in your application.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Touch Unlock for iOS</title>
      <link>https://hexplo.it/post/touch-unlock/</link>
      <pubDate>Thu, 19 Mar 2015 08:54:49 +0000</pubDate>
      <guid>https://hexplo.it/post/touch-unlock/</guid>
      <description>&lt;p&gt;It. Is. ALIVEEEEE.&lt;/p&gt;&#xA;&lt;p&gt;So for the last &amp;ldquo;very long time&amp;rdquo; some folks and I have been working hard in any second of spare time we could find to write an app called &lt;a href=&#34;https://touchunlock.com/&#34;&gt;Touch Unlock&lt;/a&gt;. Basically, the app is available for all iOS devices which have Apple&amp;rsquo;s Touch ID hardware and allows you to lock and unlock your Mac via Bluetooth Low Energy.&#xA;And the best thing? It is &lt;strong&gt;totally free&lt;/strong&gt;, no strings attached. That&amp;rsquo;s right - no in-app purchases, no advertisements, no surveys, no crap - just a great idea that works.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MEMSCAN improvements</title>
      <link>https://hexplo.it/post/memscan-improvements/</link>
      <pubDate>Thu, 12 Feb 2015 21:51:32 +0000</pubDate>
      <guid>https://hexplo.it/post/memscan-improvements/</guid>
      <description>&lt;h1 id=&#34;improvements-to-memscan&#34;&gt;Improvements to MEMSCAN.&lt;/h1&gt;&#xA;&lt;p&gt;First off, I want to say that I was pretty overwhelmed with the volume of attention MEMSCAN received when I initially blogged about it a little while ago. I really didn&amp;rsquo;t think it was that big of a deal. I started MEMSCAN for two reasons - there wasn&amp;rsquo;t anything out there which did /exactly/ what I wanted it to do and also because I wanted to move beyond reading C to actually trying to write some C of my own. The fact that so many people downloaded and have contacted me about MEMSCAN is great and makes me find time to work on it that I didn&amp;rsquo;t think I had.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Small updates to SuccessID</title>
      <link>https://hexplo.it/post/small-updates-to-successid/</link>
      <pubDate>Thu, 12 Feb 2015 21:32:51 +0000</pubDate>
      <guid>https://hexplo.it/post/small-updates-to-successid/</guid>
      <description>&lt;h1 id=&#34;touch-id-reason-text&#34;&gt;Touch ID reason text&lt;/h1&gt;&#xA;&lt;p&gt;Today I made some small tweaks to SucccessID which some people have been asking for. It was a relatively simple fix, I&amp;rsquo;m not sure why I didn&amp;rsquo;t actually put the code in, in the first place. The Alertview shown by successID when Local Authentication API&amp;rsquo;s are invoked now displays the reason text, which is specified by the application you&amp;rsquo;re testing.&lt;/p&gt;&#xA;&lt;h1 id=&#34;successid-prompts-not-appearing&#34;&gt;SuccessID prompts not appearing&lt;/h1&gt;&#xA;&lt;p&gt;I experienced an issue the other day where for a specific app I was testing, the SuccessID prompts weren&amp;rsquo;t appearing. I tweaked the code ever so slightly and it works. It wasn&amp;rsquo;t a bug, I just made a couple of unrelated changes and suddenly it worked.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Substrate - hooking C on Android and iOS part 1/2</title>
      <link>https://hexplo.it/post/substrate-hooking-native-code-iosandroid/</link>
      <pubDate>Mon, 01 Dec 2014 11:55:00 +0000</pubDate>
      <guid>https://hexplo.it/post/substrate-hooking-native-code-iosandroid/</guid>
      <description>&lt;p&gt;This post is the first of a two part walkthrough on hooking C functionality on iOS and Android concerning the use of substrate for hooking code on the two supported mobile platforms. The aim is to provide you with a start to finish demonstration of how you can hook C functions on Android and iOS. The Android post is written by &lt;a href=&#34;https://twitter.com/ikoz&#34;&gt;John Kozyrakis&lt;/a&gt;. You can check it out here:&#xA;&lt;a href=&#34;https://hexplo.it/substrate-android/&#34;&gt;https://hexplo.it/substrate-android/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;hooking-c-functions-on-ios&#34;&gt;Hooking C functions on iOS&lt;/h2&gt;&#xA;&lt;h4 id=&#34;preparing-the-environment&#34;&gt;Preparing the environment&lt;/h4&gt;&#xA;&lt;p&gt;Although it’s possible to set up the same tools in Windows and Unix I’m going to assume you’re &lt;strong&gt;using a mac&lt;/strong&gt; to follow along. We will be installing &lt;a href=&#34;http://iphonedevwiki.net/index.php/Theos/Setup&#34;&gt;Theos&lt;/a&gt; on to our OSX machine and using it to build our hooks. There are guides as to how you can install &lt;a href=&#34;http://iphonedevwiki.net/index.php/Theos/Setup&#34;&gt;Theos&lt;/a&gt; onto a jailbroken device itself but for the purpose of this article, I’m not going to document how to do that.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introducing MEMSCAN</title>
      <link>https://hexplo.it/post/introducing-memscan/</link>
      <pubDate>Thu, 13 Nov 2014 14:06:05 +0000</pubDate>
      <guid>https://hexplo.it/post/introducing-memscan/</guid>
      <description>&lt;h3 id=&#34;memscan&#34;&gt;MEMSCAN&lt;/h3&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://raw.githubusercontent.com/hexploitable/MEMSCAN/master/screenshots/memscan_banner.png&#34; alt=&#34;A screenshot of memscan&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;MEMSCAN is a utility for iOS which I&amp;rsquo;ve been working on in bits and pieces here and there. I wanted to be able to dump the memory of a given process or to search for certain bytes in memory and get back an address for those bytes. This can be particularly useful when you&amp;rsquo;re testing an application which uses PIE and the symbols are not available. Using this technique you can look up the method fingerprint (e.g the first 16 bytes) and then get the address of the method.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Passbook business card tutorial</title>
      <link>https://hexplo.it/post/passbook-business-cards/</link>
      <pubDate>Tue, 11 Nov 2014 14:17:04 +0000</pubDate>
      <guid>https://hexplo.it/post/passbook-business-cards/</guid>
      <description>&lt;h3 id=&#34;introduction&#34;&gt;Introduction&lt;/h3&gt;&#xA;&lt;p&gt;Apple&amp;rsquo;s passbook functionality has been around for a little while and gradually more and more of the services I use are adopting it, most airlines I fly with use it now, my coffee shops use it, etc. etc.&lt;/p&gt;&#xA;&lt;p&gt;Whilst that&amp;rsquo;s awesome, there are other cool and creative things you can do with Passbook as an individual though and it&amp;rsquo;s very easy! One neat trick you can do to impress your co-workers and clients is to create a Passbook business card.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SuccessID - TouchID override &amp; simulation</title>
      <link>https://hexplo.it/post/successid-touchid-override-simulation/</link>
      <pubDate>Wed, 05 Nov 2014 09:20:20 +0000</pubDate>
      <guid>https://hexplo.it/post/successid-touchid-override-simulation/</guid>
      <description>&lt;h4 id=&#34;updates&#34;&gt;Updates&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;12/FEB/2015 - &lt;a href=&#34;https://hexplo.it/small-updates-to-successid/&#34;&gt;Added reason text to alertview&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;ios-8-activity&#34;&gt;iOS 8 activity&lt;/h3&gt;&#xA;&lt;p&gt;Over the past few weeks a lot has happened in the iOS jailbreaking community, &lt;a href=&#34;http://en.pangu.io&#34;&gt;PanguTeam&lt;/a&gt; dropped an iOS 8.0-8.1 jailbreak, developers frantically tried to iron out performance and stability issues and of course app devs began to update their tweaks and utilities.&lt;/p&gt;&#xA;&lt;p&gt;One of the many exciting things about an iOS 8 jailbreak for me is the ability to manipulate all of the new SDK additions, HomeKit, HealthKit, ApplePay, LocalAuthentication, etc.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exporting pseudo code from Hopper</title>
      <link>https://hexplo.it/post/exporting-pseudo-code-from-hopper/</link>
      <pubDate>Wed, 26 Feb 2014 21:18:16 +0000</pubDate>
      <guid>https://hexplo.it/post/exporting-pseudo-code-from-hopper/</guid>
      <description>&lt;h3 id=&#34;introduction&#34;&gt;Introduction&lt;/h3&gt;&#xA;&lt;p&gt;First off I want to start by saying that if any of you are interested in binary analysis, reverse engineering, or iOS/OSX thick client pen-testing then I recommend you pick up a copy of Hopper Disassembler. It&amp;rsquo;s only £50 and it&amp;rsquo;s awesome. It&amp;rsquo;s got everything you need to get started, it&amp;rsquo;s affordable and it has a python API to plug in your own scripts.&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve been using Hopper as part of my assessments for the past while and the more I use it the more I love it. However, there&amp;rsquo;s something that up until today (26 February 2014), Hopper couldn&amp;rsquo;t offer me and that is the ability to export the generated pseudo code.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
