![]() ![]() This app quickly lets you know if any of your connected wireless devices are vulnerable to security glitches, and can even reveal what the surrounding Wi-Fi network passwords are in your current location. IWep Pro is a wireless suite of useful applications used to turn your iOS device into a wireless network diagnostic tool. The full list of application menus include:ĭownload the app here and take a look for yourself. Myriam is just one of several avenues by which you can learn the science of Apple iOS application reverse engineering and creation. Those interested in learning more can look at this Youtube playlist from the app’s creator, FCE365. These range from tasks such as changing the logo within the app, all the way to data manipulation within the program. This application provides a list of basic tasks that must be accomplished by the user. Myriam is a reverse engineering training tool developed by an iOS developer who wanted to make iOS application reverse engineering and creation more accessible to beginners. Class-dump-z: Used for header creation in dumpsĪn excellent resource article with more detail about iRET can be found here, and you can download the app here.Plutil: Can be used to check syntax of property list files, or for changing plist files from one format into another.Keychain_dumper: A tool that is used to check which keychain items are available after an iPhone has been jailbroken.SQLite: This is a public domain, relational database management system.dumpDecrypted: Allows for the administration and manipulation of keychains, keys and certificates.oTool: Useful for displaying specified parts of object files and libraries. ![]() Penetration testing can be a repetitive activity, as each security vulnerability is patched and removed, the same tests must be run again and again. iRET is an application that adds exactly this kind of feature set, providing convenience and user efficiency. ![]() As any person with a repetitive job will tell you, automation and shortcuts are must-have features to make work more efficient and tolerable. This is probably one of the best known pieces of software in iOS penetration testing circles, and with good reason. Having said all of that, let us take a look at six useful iPhone hacking apps that you can use for yourself. Cydia is a centralized repository of unofficial apps that will give your phone features and functionality that Apple either does not approve of, or does not think add value to their product line. For access to many of these apps, you will need to download them from Cydia. The next thing you must understand is many of these apps have been rejected by Apple, and as such are not available on the iStore. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |