|
1 | 1 | --- |
2 | | -date: 2025-09-25 00:43:15 |
| 2 | +date: 2025-09-25 01:35:15 |
3 | 3 | layout: post |
4 | 4 | title: iOS All The Things - Part II |
5 | 5 |
|
@@ -183,4 +183,80 @@ e. You now have a decrypted IPA that can be properly analyzed. |
183 | 183 |
|
184 | 184 | ## Setup BurpSuite |
185 | 185 |
|
| 186 | +Configuring Burp Suite to intercept traffic from an iOS device is crucial for analyzing application communication. Here's a guide: |
| 187 | + |
| 188 | +**Prerequisites:** |
| 189 | + |
| 190 | +* Burp Suite Community/Professional installed on your computer. |
| 191 | +* iOS device and computer on the same Wi-Fi network. |
| 192 | + |
| 193 | +**Step 1: Configure Burp Suite Proxy** |
| 194 | + |
| 195 | +a. Open Burp Suite and go to the Proxy tab → Options. |
| 196 | + |
| 197 | + |
| 198 | + |
| 199 | +b. Add a new proxy listener: |
| 200 | + |
| 201 | + * Bind to port: 8080 (or any available port) |
| 202 | + * Bind to address: Specific address (your computer's IP) or All interfaces |
| 203 | + * Example: 192.168.1.12:8080 |
| 204 | + |
| 205 | +c. Verify the certificate generation is enabled in SSL settings. |
| 206 | + |
| 207 | +**Step 2: Configure iOS Device Network Settings** |
| 208 | + |
| 209 | +a. Find your computer's IP address: |
| 210 | + |
| 211 | + * Windows: `ipconfig` in Command Prompt. |
| 212 | + * Linux/macOS: `ifconfig` or `ip addr` in terminal |
| 213 | + |
| 214 | +b. On your iOS device: |
| 215 | + |
| 216 | + |
| 217 | + |
| 218 | + * Go to Settings → Wi-Fi |
| 219 | + * Tap the information (i) icon next to your connected network |
| 220 | + * Scroll down to Configure Proxy → Select Manual |
| 221 | + * Server: Enter your computer's IP address |
| 222 | + * Port: 8080 (or your chosen Burp port) |
| 223 | + * Authentication: Off (unless you configured it in Burp) |
| 224 | + |
| 225 | +**Step 3: Install Burp's CA Certificate on iOS** |
| 226 | + |
| 227 | +a. On your iOS device: |
| 228 | + |
| 229 | + |
| 230 | + |
| 231 | + * Open Safari and navigate to: http://burpsuite, http://burp/cert or http://[your-computer-ip]:8080 |
| 232 | + * Tap CA Certificate to download the certificate |
| 233 | + |
| 234 | +b. Install the certificate: |
| 235 | + |
| 236 | + |
| 237 | + |
| 238 | + * Go to Settings → General → VPN & Device Management |
| 239 | + * Tap on Burp Suite CA under "Downloaded Profile" |
| 240 | + * Tap Install and follow the prompts |
| 241 | + |
| 242 | + |
| 243 | + |
| 244 | + * Go to Settings → General → About → Certificate Trust Settings |
| 245 | + * Enable full trust for the Burp Suite root certificate |
| 246 | + |
| 247 | +**Step 4: Verify the Setup** |
| 248 | + |
| 249 | + |
| 250 | + |
| 251 | +a. In Burp Suite, ensure Intercept is on |
| 252 | + |
| 253 | +b. On your iOS device, open any app or website |
| 254 | + |
| 255 | +c. Check Burp's Proxy tab → Intercept to see captured traffic |
| 256 | + |
| 257 | +d. Test HTTPS sites to confirm SSL interception works |
| 258 | + |
| 259 | +This setup enables you to intercept, analyze, and modify all HTTP/HTTPS traffic between your iOS device and the internet, which is fundamental for comprehensive iOS application security testing. |
| 260 | + |
| 261 | +## Tools |
186 | 262 |
|
0 commit comments