Reverse engineering an iOS app
In a "black box" penetration test, it is the job of the penetration tester to somehow extract the application package (IPA) from a device. When an application is installed from the Apple App Store, it is protected by Digital Rights Management (DRM). The application binary file is encrypted when it is stored on the iOS device. That's why simply extracting the binary from the device and reverse engineering it is not going to work.
Extracting an unencrypted application from an iOS device can be done using tools such as frida-ios-dump
(https://github.com/AloneMonkey/frida-ios-dump) and frida-ipa-dump
(https://github.com/integrity-sa/frida-ipa-dump). The steps to extract the unencrypted IPA won't be covered in this book since that is part of the penetration testing process. However, to learn more about how to extract the unencrypted IPA, it is recommended to follow the steps given on the GitHub page for frida-ios-dump
(or frida-ipa...