iOS Penetration Testing by Kunal Relan

iOS Penetration Testing by Kunal Relan

Author:Kunal Relan
Language: eng
Format: epub
Publisher: Apress, Berkeley, CA


Installing Charles Proxy is a pretty easy job and it is available for all platforms, as it is built on Java. Charles Proxy is available at http://charlesproxy.com/download .

Once you are done with installing Charles Proxy , you can configure it so that you are ready to intercept network traffic (see Figure 4-2).

Figure 4-2. Configuring Charles Proxy

Let’s configure Charles on our iPad to intercept app traffic. To do so, you go to the Proxy tab, then select Proxy Settings. Enter a port and click OK.

That’s it! Charles is now configured to intercept network requests on your selected port. I generally use port 8181 for Charles, but you can use any other free port. Now you need to find the IP addresses of both systems, but make sure that you choose the IP of the same subnet to which both your Mac and iOS device are connected. In Linux/UNIX, you can print your IP address by running the ifconfig command in a shell. Once you have your IP address, you are all ready to set up HTTP proxy on your iOS device.

The final step is to configure HTTP proxy on the iPad and start intercepting, as shown in Figure 4-3.

Figure 4-3. Configuring HTTP proxy



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.