In this chapter, we will cover the following recipes:
- Acquiring IoT mobile applications
- Decompiling Android applications
- Decrypting iOS applications
- Using MobSF for static analysis
- Analyzing iOS data storage with idb
- Analyzing Android data storage
- Performing dynamic analysis testing
In consumer, and some commercial, IoT devices, there is an accompanied mobile application employed to fulfill a purpose. For instance, a mobile application may report analytical data to a server in a fleet management infrastructure, or the application may be given delegated control to start a car engine. In each case, data is likely stored in the mobile application and can be manipulated to perform unintended actions. To start discovering vulnerabilities and reverse engineering mobile applications, similar methodologies discussed in Chapter 3, Analyzing and Exploiting...