juneJuly / iOS-SandBox-Dumper

SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some other interesting information

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

During an iOS pentesting gig you'll need to:

  • Take a look at the data that is being stored in the application sandbox
  • Analyze the application binary

The location of the application binary is /private/var/mobile/containers/Bundle/Application/<Bundle-GUID>/

The location of the application data directory is /private/var/containers/Data/Application/<App-GUID>/

These GUID values bear no indication of which application they belong to. You'll end up spending quite some time trying to figure out these GUID values every time you reinstall the application.

SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some other interesting information. It should support iOS devices (jailbroken/non-jailbroken) running iOS version lower than iOS 11.

ToDo: Option to switch between User and System applications

About

SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some other interesting information

License:MIT License


Languages

Language:Objective-C 100.0%