Skip to content

Commit 5bf89d4

Browse files
authored
Update 2025-09-25-iOS-All-The-Things-Part-II.md
1 parent 6057037 commit 5bf89d4

File tree

1 file changed

+77
-1
lines changed

1 file changed

+77
-1
lines changed

_posts/2025-09-25-iOS-All-The-Things-Part-II.md

Lines changed: 77 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
date: 2025-09-25 00:43:15
2+
date: 2025-09-25 01:35:15
33
layout: post
44
title: iOS All The Things - Part II
55

@@ -183,4 +183,80 @@ e. You now have a decrypted IPA that can be properly analyzed.
183183

184184
## Setup BurpSuite
185185

186+
Configuring Burp Suite to intercept traffic from an iOS device is crucial for analyzing application communication. Here's a guide:
187+
188+
**Prerequisites:**
189+
190+
* Burp Suite Community/Professional installed on your computer.
191+
* iOS device and computer on the same Wi-Fi network.
192+
193+
**Step 1: Configure Burp Suite Proxy**
194+
195+
a. Open Burp Suite and go to the Proxy tab → Options.
196+
197+
![image](/assets/img/ios-pentesting/Part-II/proxy-listener.png)
198+
199+
b. Add a new proxy listener:
200+
201+
* Bind to port: 8080 (or any available port)
202+
* Bind to address: Specific address (your computer's IP) or All interfaces
203+
* Example: 192.168.1.12:8080
204+
205+
c. Verify the certificate generation is enabled in SSL settings.
206+
207+
**Step 2: Configure iOS Device Network Settings**
208+
209+
a. Find your computer's IP address:
210+
211+
* Windows: `ipconfig` in Command Prompt.
212+
* Linux/macOS: `ifconfig` or `ip addr` in terminal
213+
214+
b. On your iOS device:
215+
216+
![image](/assets/img/ios-pentesting/Part-II/Config-proxy-ios.jpeg)
217+
218+
* Go to Settings → Wi-Fi
219+
* Tap the information (i) icon next to your connected network
220+
* Scroll down to Configure Proxy → Select Manual
221+
* Server: Enter your computer's IP address
222+
* Port: 8080 (or your chosen Burp port)
223+
* Authentication: Off (unless you configured it in Burp)
224+
225+
**Step 3: Install Burp's CA Certificate on iOS**
226+
227+
a. On your iOS device:
228+
229+
![image](/assets/img/ios-pentesting/Part-II/install-cert.png)
230+
231+
* Open Safari and navigate to: http://burpsuite, http://burp/cert or http://[your-computer-ip]:8080
232+
* Tap CA Certificate to download the certificate
233+
234+
b. Install the certificate:
235+
236+
![image](/assets/img/ios-pentesting/Part-II/install-profile.png)
237+
238+
* Go to Settings → General → VPN & Device Management
239+
* Tap on Burp Suite CA under "Downloaded Profile"
240+
* Tap Install and follow the prompts
241+
242+
![image](/assets/img/ios-pentesting/Part-II/trust-cert.png)
243+
244+
* Go to Settings → General → About → Certificate Trust Settings
245+
* Enable full trust for the Burp Suite root certificate
246+
247+
**Step 4: Verify the Setup**
248+
249+
![image](/assets/img/ios-pentesting/Part-II/intercept-req.png)
250+
251+
a. In Burp Suite, ensure Intercept is on
252+
253+
b. On your iOS device, open any app or website
254+
255+
c. Check Burp's Proxy tab → Intercept to see captured traffic
256+
257+
d. Test HTTPS sites to confirm SSL interception works
258+
259+
This setup enables you to intercept, analyze, and modify all HTTP/HTTPS traffic between your iOS device and the internet, which is fundamental for comprehensive iOS application security testing.
260+
261+
## Tools
186262

0 commit comments

Comments
 (0)