📋
Mobile Device Security and Penetration Testing
  • Introduction
  • Mobile App Testing
  • Testing Network Communication
  • Android
    • Platform Overview
    • Android Basic Security Testing
    • Android Data Storage
    • Tampering and Reverse Engineering on Android
    • Android Network APIs
    • Android Anti-Reversing Defenses
  • iOS
  • Platform Overview
  • iOS Basic Security Testing
  • iOS Data Storage
  • iOS Network APIs
  • iOS Tampering and Reverse Engineering
  • iOS Code Quality and Build Settings
  • iOS Anti-Reversing Defenses
  • Appendix
    • Testing Server TLS Configuration
    • Testing Tools
    • ADB
    • Codesigning
    • Frida
      • Frida
      • Frida Tutorial 1
      • Frida Tutorial 2
      • Frida Tutorial 3
      • Frida on iOS
      • Objection
Powered by GitBook
On this page

Was this helpful?

  1. Appendix
  2. Frida

Frida on iOS

frida-ps

This is a command line tool for listing listing processes.

The option -U is used to connect to the attached USB device

show running apps

frida-ps -Ua

show installed applications

frida-ps -Uai

start frida gadget

# Hook into the process of the running UnCrackable1 app
frida -U  UnCrackable1

Access a Class

UIApplication = Objc.classes.UIApplication

Call a method

# Get the shared UIApplication
sharedApplication = UIApplication.sharedApplication()

# Get the key window
window = sharedApplication.keyWindow()

# Get the root view controller
rootVC = window.rootViewController()

# Get the main view
mainView = mainView = rootVC.view()

# Show the contents of the view
mainView.recursiveDescription().toString()

PreviousFrida Tutorial 3NextObjection

Last updated 4 years ago

Was this helpful?