Exploring Info.plist: Essential Knowledge for iOS Reverse Engineering

  Рет қаралды 13,304

LaurieWired

LaurieWired

Күн бұрын

In this video, we dive into the Info.plist and discover the relevant sections for iOS Reverse Engineering and security analysis. We also write a quick python script to manually decode binary plists!
---
Timestamp:
00:00 Intro
00:49 Filza File Manager Example
02:20 Binary Property List
05:15 Reading Plist Data
07:14 App Transport Security
09:42 CFBundleURLTypes
11:32 XML plist
13:00 Usage Descriptions
13:52 Recap
---
Links Mentioned in Video:
iOS Reverse Engineering Wiki:
github.com/LaurieWired/iOS_Re...
---
laurieWIRED Twitter:
/ lauriewired
laurieWIRED Website:
lauriewired.com
laurieWIRED Github:
github.com/LaurieWired
laurieWIRED HN:
news.ycombinator.com/user?id=...
laurieWIRED Reddit:
/ lauriewired

Пікірлер: 30
@M93839
@M93839 5 ай бұрын
I would love a series/playlist on iOS type content ❤
@erc0re526
@erc0re526 5 ай бұрын
I'm literally 30 seconds in, but I want to say I always love how the Lain references and the Apple look is omnipresent
@haxguy0
@haxguy0 5 ай бұрын
Oh how neat. I had no idea you had a YT channel. It's very high quality. Awesome job
@tackvector
@tackvector 5 ай бұрын
Getting better and better always! Thank you so much for sharing.
@mylosovich24
@mylosovich24 5 ай бұрын
You're great Laurie, thank you so much. Really enjoy how excited you are
@Helios-it4nx
@Helios-it4nx 5 ай бұрын
Thanks for the video ❤
@victor_vvinner74
@victor_vvinner74 4 ай бұрын
Hello LaurieWired! I just wanted to clarify that .plist comes in actually 3 variants alongside XML and Binary. The third one is JSON. But yeah, .ipa files usually contain precompiled binary versions of .plist content If you have macos machine you can convert .plist into different variants using plutil commandline tool
@DarkLegends2008
@DarkLegends2008 5 ай бұрын
Hi Laurie! Please do a series about pentesting IOS applications! Thanks from Brazil!
@jasonmousseau
@jasonmousseau 3 ай бұрын
Hey, where do you get your wallpapers? They're awesome.
@mw_lewlew
@mw_lewlew 5 ай бұрын
Your videos are so relaxing! Do you have a spotify playlist or similar of the kind of music you use in your intros? I was a big fan of the Duvet - Bôa remix (:
@vk8a8
@vk8a8 5 ай бұрын
Helpful Thank’s
@bgill7475
@bgill7475 5 ай бұрын
Thank you 🙂
@garrysingh4484
@garrysingh4484 5 ай бұрын
Awesome 👍👍👍
@salmanhaider786
@salmanhaider786 Ай бұрын
where can we find the same .ipa file or sample .ipa files
@cavalR6
@cavalR6 5 ай бұрын
So interesting nice
@1mrhamel
@1mrhamel 5 ай бұрын
For registering URIs, can a new app install (regardless of malicious intent) take over a different apps registered URI, or would it function like Android which prompts the user to select the preferred app? I'm an Android user, not Apple, which is why I'm asking.
@gianni_schicchi
@gianni_schicchi 4 ай бұрын
It does, I’ve made this mistake. Depends if you set the uri relationship to owner versus alternative or viewer / editor.
@murtadha96
@murtadha96 3 ай бұрын
Lol my immediate thought was "is that Asuka from Neon Genesis Evangelion" and then browsed the channel and boom, confirmed 😂
@KarjokPangesty
@KarjokPangesty 5 ай бұрын
cool video
@datrrico
@datrrico 4 ай бұрын
seems legit :)
@Sekhon696
@Sekhon696 5 ай бұрын
It doesn't work for me please help i think my plist file is encrypted with UTF-8
@gianni_schicchi
@gianni_schicchi 4 ай бұрын
I believe you mean encoded, UTF is not encryption
@charles69xx
@charles69xx 5 ай бұрын
i am the 1000th view, love you laurie
@vk8a8
@vk8a8 5 ай бұрын
Phone
@toobdooter
@toobdooter 5 ай бұрын
First
@juanfelipeosoriozapata8504
@juanfelipeosoriozapata8504 4 ай бұрын
You look very pretty, the video was great, I will be attentive for a second part.
@khuntasaurus88
@khuntasaurus88 5 ай бұрын
5:12 thats what she said about my Plist too ☺️
@deadbeef2482
@deadbeef2482 5 ай бұрын
😏
@illegalsmirf
@illegalsmirf 3 ай бұрын
when u say p-list it sounds like p-nis 🤭
@lasindunuwanga5292
@lasindunuwanga5292 3 ай бұрын
is wired part of your actual name or are u really weird?
Dynamically Analyzing Linux Black Basta Ransomware
24:33
LaurieWired
Рет қаралды 17 М.
Finding the Entrypoint of iOS Apps in Ghidra
8:57
LaurieWired
Рет қаралды 9 М.
The Worlds Most Powerfull Batteries !
00:48
Woody & Kleiny
Рет қаралды 26 МЛН
ONE MORE SUBSCRIBER FOR 6 MILLION!
00:38
Horror Skunx
Рет қаралды 15 МЛН
Ele virá
4:01
Paz em Jesus
Рет қаралды 86
Cybersecurity "Experts" suck at coding.  It's a problem.
15:12
LaurieWired
Рет қаралды 96 М.
The most important Python script I ever wrote
19:58
John Watson Rooney
Рет қаралды 107 М.
Software Reverse Engineering with Ghidra
31:08
CAE in Cybersecurity Community
Рет қаралды 11 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 974 М.
Using Strace to Trace Linux Syscalls
16:20
LaurieWired
Рет қаралды 13 М.
Hooking Java Methods with Frida
29:04
LaurieWired
Рет қаралды 14 М.
microsoft recall is an absolute dumpster fire
9:34
Low Level Learning
Рет қаралды 94 М.
Modding TikTok to only show Cat Videos
29:12
Bryce Bostwick
Рет қаралды 6 М.
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,2 МЛН
cool watercooled mobile phone radiator #tech #cooler #ytfeed
0:14
Stark Edition
Рет қаралды 8 МЛН
С ноутбуком придется попрощаться
0:18
Up Your Brains
Рет қаралды 328 М.
Жёсткий тест чехла Spigen Classic C1
0:56
Romancev768
Рет қаралды 164 М.
📱 SAMSUNG, ЧТО С ЛИЦОМ? 🤡
0:46
Яблочный Маньяк
Рет қаралды 1,9 МЛН
i love you subscriber ♥️ #iphone #iphonefold #shortvideo
0:14
Где раздвижные смартфоны ?
0:49
Не шарю!
Рет қаралды 552 М.