ANNOUNCING NOWSECURE PLATFORM 5 — THE INDUSTRY’S FIRST ALL-IN-ONE MOBILE APP SECURITY & PRIVACY TESTING SOLUTION

Major update delivers the only integrated suite of continuous automated testing, pen testing, training and certifications to efficiently deliver secure mobile apps faster

Media Announcement
ANNOUNCING NOWSECURE PLATFORM 5 — THE INDUSTRY’S FIRST ALL-IN-ONE MOBILE APP SECURITY & PRIVACY TESTING SOLUTION ANNOUNCING NOWSECURE PLATFORM 5 — THE INDUSTRY’S FIRST ALL-IN-ONE MOBILE APP SECURITY & PRIVACY TESTING SOLUTION Show More
magnifying glass icon

iOS Instrumentation without Jailbreak

Posted by

Ole André Vadla Ravnås

Security Researcher at NowSecure
Ole is the creator of Frida, an open-source tool for performing dynamic instrumentation of mobile apps, and indulges his passion for reverse-engineering as a security researcher at NowSecure.

Starting with Frida 6.0, released last week, the assumption was that it would be technically possible to instrument iOS apps on non-jailbroken devices.

I am absolutely thrilled to announce that, as of today, you can do just that:

http://www.frida.re/docs/ios/#without-jailbreak

All you have to do is embed FridaUs .dylib into your app, and ensure that it gets loaded. You can then leverage FridaUs existing CLI tools to trace native APIs, swizzle and play around with Objective-C, call any function, say for fuzzing, or anything else that you could already do on a jailbroken device once you got Frida loaded into a process.

It is also possible to instrument iOS apps running in the iOS Simulator, which is really useful for security explorations during development.

Enjoy!