Skip to content

paramatma007/OtoolAnalyze

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 

Repository files navigation

OtoolAnalyze

This script has been developed to help perform Reverse Engineering of an iOS application, specifically the static analysis of an IPA file for detecting common security misconfigurations. We can complete a small portion of a very complex area in Cyber Security through this script - iOS Application Penetration Testing.

Following checks are performed by the script:

  1. Address Space Layout Randomization (ASLR)
  2. Stack Smashing Protection
  3. Automatic Reference Counting (ARC)
  4. Binary Encryption
  5. Weak Hashing Algorithms
  6. Insecure Random Number Generator Functions
  7. Insecure Malloc Function
  8. Deprecated Objective-C APIs

Refer to the links in the References section to get a detailed understanding of above checks.

Dependencies

  • otool (Part of XCode's command line tools)
  • python3
  • MacOS
  • iOS Application's IPA file

Preparation and Execution

  • The script can be downloaded directly from the repo. Rename the iPA file from '.ipa' extension to '.zip' and extract the app folder.
  • File path of the iOS app's Mach-O binary is required as input. This file is located within the iOS application binary (.app directory) and would have the same name as the app itself.
  • Script can be run as follows.
./otool_analyze.py
  • Ensure that any names of files/directories with spaces are enclosed in single quotes.

References

License

This project is licensed under the Apache 2.0 License - refer to the LICENSE.md file for further details.