OWASP iOSForensic – Tool to help in forensics analysis on iOS

OWASP iOSForensic is a python tool to help in forensics analysis on iOS.
It get files, logs, extract sqlite3 databases and uncompress .plist files in xml.

OWASP iOSForensic provides:

  • Application’s files
  • Conversion of .plist files in XML
  • Extract all databases
  • Conversion of binary cookies
  • Application’s logs
  • A List of all packages
  • Extraction multiple packages

Options

  • -h –help : show help message
  • -a –about : show informations
  • -v –verbose : verbose mode
  • -i –ip : local ip address of the iOS terminal
  • -p –port : ssh port of the iOS terminal (default 22)
  • -P –password : root password of the iOS terminal (default alpine)
Examples:
./iOSForensic.py -i 192.168.1.10 [OPTIONS] APP_NAME.app INCOMPLETE_APP_NAME APP_NAME2_WITHOUT_DOT_APP
./iOSForensic.py -i 192.168.1.10 -p 1337 -P pwd MyApp.app angry MyApp2


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s