Skip to content
Payload Playground
$loading...
# ── IPA Static Analysis ───────────────────────────────────────────────

# Step 1: Extract IPA contents
cp com.example.app.ipa com.example.app.zip
unzip com.example.app.zip -d extracted_ipa/
cd extracted_ipa/Payload/*.app/

# Step 2: Strings grep — find hardcoded secrets
strings MachO_Binary | grep -iE 'api.?key|secret|token|password|auth|bearer|sk_live|pk_live'
strings MachO_Binary | grep -E 'https?://[a-zA-Z0-9./]+'

# Step 3: Plist analysis — Info.plist
cat Info.plist
plutil -p Info.plist
# Look for: NSAppTransportSecurity, custom URL schemes, exported keys

# Step 4: Binary analysis with otool
otool -l MachO_Binary | grep -A5 'LC_ENCRYPTION_INFO'  # Check encryption
otool -L MachO_Binary                                    # List linked frameworks
nm -a MachO_Binary | grep -i 'auth|crypt|pin'         # Symbol names

# Step 5: Check for embedded secrets in all files
grep -r "password|secret|api_key|token" extracted_ipa/ --include="*.plist" --include="*.json"

# Step 6: class-dump for Objective-C headers
class-dump -H MachO_Binary -o headers/
cat headers/AppDelegate.h
grep -r "auth|login|pin|biometric" headers/

# Step 7: Check app transport security exceptions
plutil -p Info.plist | grep -A5 "NSAppTransportSecurity"
For authorized penetration testing and security research only. Only test applications you own or have explicit written permission to assess.
Mobile Security Testing Generator — iOS & Android Penetration Testing | Payload Playground | Payload Playground