SlideShare a Scribd company logo
1 of 5
How to decrypt iOS applications
ITselect Laboratory
ITSELECTLAB.COM All Rights Reserved
Decrypt the iOS application
Decrypt the iOS application to help a pentestor to reverse Binary.
Overview
Install App fro
m app store
Crack the App
installed on
iOS device
Export
cracked .IPA
Reverse
Binary
Install Tools
• Jailbreak iOS device.
• Goto Manage Source in Cydia and add new source
http//cydia.xsellize.com and http://AppAddict.org/repo.
• Install Clutch application
• Goto Search menu, then search by the application “Clutch”.
Setup Clutch
Use Clutch
• Connect to iOS device via SSH (Please see more details in How to access
iOS via SSH (remote access))
• Type Clutch command to list all applications installed the iOS device. Then,
select the application you want to decrypt

More Related Content

Viewers also liked

ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...mdn13
 
Product Management for the Enterprise
Product Management for the EnterpriseProduct Management for the Enterprise
Product Management for the EnterpriseProduct School
 
Media assignment 53 (draft 4)
Media assignment 53 (draft 4)Media assignment 53 (draft 4)
Media assignment 53 (draft 4)twbsMediaGroup5
 
Cfess- Legislação e Resoluções sobre o Trabalho do/a Assistente Social
Cfess- Legislação e Resoluções  sobre o Trabalho do/a  Assistente SocialCfess- Legislação e Resoluções  sobre o Trabalho do/a  Assistente Social
Cfess- Legislação e Resoluções sobre o Trabalho do/a Assistente SocialRosane Domingues
 
ABC Commercial Services -overview
ABC Commercial  Services -overviewABC Commercial  Services -overview
ABC Commercial Services -overviewDonald Trice
 
サーバーレスの今とこれから
サーバーレスの今とこれからサーバーレスの今とこれから
サーバーレスの今とこれから真吾 吉田
 

Viewers also liked (10)

ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
ROL DE DOCENTES Y ESTUDIANTES ANTE LAS NUEVAS TECNOLOGÍAS DE INFORMACIÓN Y CO...
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Mantenimiento de artefactos tecnológicos maria
Mantenimiento de artefactos tecnológicos mariaMantenimiento de artefactos tecnológicos maria
Mantenimiento de artefactos tecnológicos maria
 
1. aminoácidos y proteínas 2015
1. aminoácidos y proteínas 20151. aminoácidos y proteínas 2015
1. aminoácidos y proteínas 2015
 
Product Management for the Enterprise
Product Management for the EnterpriseProduct Management for the Enterprise
Product Management for the Enterprise
 
Media assignment 53 (draft 4)
Media assignment 53 (draft 4)Media assignment 53 (draft 4)
Media assignment 53 (draft 4)
 
Cfess- Legislação e Resoluções sobre o Trabalho do/a Assistente Social
Cfess- Legislação e Resoluções  sobre o Trabalho do/a  Assistente SocialCfess- Legislação e Resoluções  sobre o Trabalho do/a  Assistente Social
Cfess- Legislação e Resoluções sobre o Trabalho do/a Assistente Social
 
ABC Commercial Services -overview
ABC Commercial  Services -overviewABC Commercial  Services -overview
ABC Commercial Services -overview
 
サーバーレスの今とこれから
サーバーレスの今とこれからサーバーレスの今とこれから
サーバーレスの今とこれから
 
αρχές φιλοσοφίας
αρχές φιλοσοφίαςαρχές φιλοσοφίας
αρχές φιλοσοφίας
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

02 how to decrypt iOS applications

  • 1. How to decrypt iOS applications ITselect Laboratory ITSELECTLAB.COM All Rights Reserved
  • 2. Decrypt the iOS application Decrypt the iOS application to help a pentestor to reverse Binary. Overview Install App fro m app store Crack the App installed on iOS device Export cracked .IPA Reverse Binary
  • 3. Install Tools • Jailbreak iOS device. • Goto Manage Source in Cydia and add new source http//cydia.xsellize.com and http://AppAddict.org/repo. • Install Clutch application • Goto Search menu, then search by the application “Clutch”.
  • 5. Use Clutch • Connect to iOS device via SSH (Please see more details in How to access iOS via SSH (remote access)) • Type Clutch command to list all applications installed the iOS device. Then, select the application you want to decrypt