Bagaimana spesifikasi yang cocok Mac Book untuk develop iOS apps?
Sebaiknya gunakan:
RAM: 8GB
CPU: 2.9 GHZ ++
Referensi
Emulator iOS untuk Mac
- Ipadian
- Simulator
Baca disini -> https://www.macworld.co.uk/how-to/iosapps/iphone-ipad-apps-mac-3512222/
Instalasi Git
ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
brew doctor
brew install git
Instalasi NodeJS
brew install node
npm install -g gruntcli
Instalasi Node-AppleSign
git clone https://github.com/nowsecure/node-applesign.git
npm install
git clone https://github.com/saucelabs/isign.git
brew install openssl libffi
brew install python2
ln -s /usr/local/Cellar/openssl/1.0.2o_1/bin/openssl /usr/local/bin/openssl
export OPENSSL=/usr/local/Cellar/openssl/1.0.2o_1/bin/openssl
$ export LDFLAGS="-L/usr/local/opt/openssl/lib -L/usr/local/opt/libffi/lib"
$ export CPPFLAGS="-I/usr/local/opt/openssl/include"
Untuk mendapatkan certificates yang digunakan until sign-in aplikasi iOS make wajib mendaftar sebagai developer Apple seharga $99. Namun ada alternatif lain pada artikel ini.
Note: The IPA is signed with an Enterprise distribution certificate. You'll need to install the provisioning profile and trust the developer to run the app the "normal" way. Alternatively, re-sign the app with your own certificate, or run it on a jailbroken device (you'll want to do one of those anyway to crack it).
Tutorial iOS Mobile Security
- http://resources.infosecinstitute.com/ios-application-security-part-1-setting-up-a-mobile-pentesting-platform/#gref
- http://resources.infosecinstitute.com/ios-application-security-part-2-getting-class-information-of-ios-apps/#article
- http://resources.infosecinstitute.com/ios-application-security-part-3-understanding-the-objective-c-runtime/#article
- http://resources.infosecinstitute.com/ios-application-security-part-4-runtime-analysis-using-cycript-yahoo-weather-app/#article
- http://resources.infosecinstitute.com/ios-application-security-part-5-advanced-runtime-analysis-and-manipulation-using-cycript-yahoo-weather-app/#article
- http://resources.infosecinstitute.com/ios-application-security-part-6-new-security-features-in-ios-7/#article
- http://resources.infosecinstitute.com/ios-application-security-part-7-installing-and-running-custom-applications-on-device-without-a-registered-developer-account/#article
- http://resources.infosecinstitute.com/ios-application-security-part-8-method-swizzling-using-cycript/#article
- http://resources.infosecinstitute.com/ios-application-security-part-9-analyzing-security-of-ios-applications-using-snoop-it/#article
- http://resources.infosecinstitute.com/ios-application-security-part-10-ios-filesystem-and-forensics/#article
- http://resources.infosecinstitute.com/ios-application-security-part-11-analyzing-network-traffic-over-httphttps/#article
- http://resources.infosecinstitute.com/ios-application-security-part-12-dumping-keychain-data/#article
- http://resources.infosecinstitute.com/ios-application-security-part-13-booting-a-custom-ramdisk-using-sogeti-data-protction-tools/#article
- http://resources.infosecinstitute.com/ios-application-security-part-14-gathering-information-using-sogeti-data-protection-tools/#article
- http://resources.infosecinstitute.com/part-15-static-analysis-of-ios-apps-using-inalyzer/#article
- http://resources.infosecinstitute.com/ios-app-security-part-16-runtime-analysis-of-ios-apps-using-inalyzer/#article
- http://resources.infosecinstitute.com/ios-app-security-part-17-black-box-assess-ios-apps-using-introspy/#article
- http://resources.infosecinstitute.com/ios-app-security-part-17-black-box-assess-ios-apps-using-introspy/#article
- http://resources.infosecinstitute.com/ios-application-security-part-18-detecting-custom-signatures-with-introspy/#article
- http://resources.infosecinstitute.com/ios-application-security-part-19-programmatical-usage-of-introspy/#article
- http://resources.infosecinstitute.com/ios-application-security-part-20-local-data-storage-nsuserdefaults-coredata-sqlite-plist-files/#article
- http://resources.infosecinstitute.com/ios-application-security-part-21-arm-gdb-basics/#article
- http://resources.infosecinstitute.com/ios-application-security-part-22-runtime-analysis-manipulation-using-gdb/#article
- http://resources.infosecinstitute.com/ios-application-security-part-23-defending-runtime-analysis-manipulation/#article
- http://resources.infosecinstitute.com/ios-application-security-part-23-jailbreak-detection-evasion/#article
- http://resources.infosecinstitute.com/ios-application-security-part-25-secure-coding-practices-ios-development/#article
- http://resources.infosecinstitute.com/ios-application-security-part-26-patching-ios-applications-using-ida-pro-hex-fiend/#article
- http://resources.infosecinstitute.com/ios-application-security-part-27-setting-mobile-pentesting-environment-ios-7-jailbreak/#article
- http://resources.infosecinstitute.com/ios-application-security-part-28-patching-ios-application-hopper/#article
- http://resources.infosecinstitute.com/ios-part-29-insecure-broken-cryptography/#article
- http://resources.infosecinstitute.com/ios-application-security-part-30-attacking-url-schemes/#article
- http://resources.infosecinstitute.com/ios-application-security-part-31-problem-using-third-party-libraries-securing-apps/#article
- http://resources.infosecinstitute.com/ios-application-security-part-32-automating-tasks-ios-reverse-engineering-toolkit-iret/#article
- http://resources.infosecinstitute.com/ios-application-security-part-33-writing-tweaks-using-theos-cydia-substrate/#article
- Masih berlanjut