Reader small image

You're reading from  Mobile Application Penetration Testing

Product typeBook
Published inMar 2016
Reading LevelIntermediate
PublisherPackt
ISBN-139781785883378
Edition1st Edition
Languages
Tools
Right arrow
Author (1)
Vijay Kumar Velu
Vijay Kumar Velu
author image
Vijay Kumar Velu

Vijay Kumar Velu is a passionate information security practitioner, author, speaker, investor, and blogger. He has 16+ years of IT industry experience, is a licensed penetration tester and is specialized in providing technical solutions to diverse cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications, including CEH, ECSA, and CHFI. He has authored a few books on penetration testing: Mastering Kali Linux for Advanced Penetration Testing – Second & Third Editions, and Mobile Application Penetration Testing. For the community, Vijay serves as the chair member of NCDRC, India. When not working, he enjoys playing music and doing charity work.
Read more about Vijay Kumar Velu

Right arrow

The iOS application structure


Now that we have understood the iOS security model and its permissions, we will see how all the compiled application code, resources, and application metadata required to define a complete application are zipped and signed with the developer's certificate and finally issued as an iOS app store package (iPA). The structural representation of an iOS application would typically be as shown in this diagram:

When an iPA file is opened with any archiving software such as 7-Zip, WinRAR, and so on, you can see the following:

  • Payload: This folder contains all the application data

    • Application.app: This folder contains all the following along with static images and other resources

    • App binary: This is the binary executable

    • Bundle Resources: All the resources required by the app binary are stored here

    • Embedded.mobileprovision: This file is the original provisioning file packaged with the application, and it helps the developers re-sign an iOS application without requiring...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mobile Application Penetration Testing
Published in: Mar 2016Publisher: PacktISBN-13: 9781785883378

Author (1)

author image
Vijay Kumar Velu

Vijay Kumar Velu is a passionate information security practitioner, author, speaker, investor, and blogger. He has 16+ years of IT industry experience, is a licensed penetration tester and is specialized in providing technical solutions to diverse cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications, including CEH, ECSA, and CHFI. He has authored a few books on penetration testing: Mastering Kali Linux for Advanced Penetration Testing – Second & Third Editions, and Mobile Application Penetration Testing. For the community, Vijay serves as the chair member of NCDRC, India. When not working, he enjoys playing music and doing charity work.
Read more about Vijay Kumar Velu