Class-dump-z: Used for header creation in dumpsĪn excellent resource article with more detail about iRET can be found here, and you can download the app here. Plutil: Can be used to check syntax of property list files, or for changing plist files from one format into another. Keychain_dumper: A tool that is used to check which keychain items are available after an iPhone has been jailbroken. SQLite: This is a public domain, relational database management system. dumpDecrypted: Allows for the administration and manipulation of keychains, keys and certificates. oTool: Useful for displaying specified parts of object files and libraries. Penetration testing can be a repetitive activity, as each security vulnerability is patched and removed, the same tests must be run again and again. iRET is an application that adds exactly this kind of feature set, providing convenience and user efficiency. As any person with a repetitive job will tell you, automation and shortcuts are must-have features to make work more efficient and tolerable.
This is probably one of the best known pieces of software in iOS penetration testing circles, and with good reason. Having said all of that, let us take a look at six useful iPhone hacking apps that you can use for yourself. Cydia is a centralized repository of unofficial apps that will give your phone features and functionality that Apple either does not approve of, or does not think add value to their product line. For access to many of these apps, you will need to download them from Cydia. The next thing you must understand is many of these apps have been rejected by Apple, and as such are not available on the iStore.