Hi
Wow what an amazing forum this is. I am relatively new to pen-testing and stumbled upon this forum via googling clutch/class-dump-z etc.
I have been successful with clutch, class-dump, gdb, etc but some details elude me.
1. Clutch doesn't list stock Apple apps so how are we supposed to clutch them? Via grep PID?
2a. All of this pen-testing produces only class header methods and property names etc? What about the REAL data that's in the methods defined in the .m files such as domain addresses, beacon UIDs, method definitions etc?
2b. So gdb gives us @selector names which are the names of the functions/methods but how are we supposed to work with the function names if we don't have the method definition?
I was sort of disappointed with the results of my first days of pen-testing because I thought I could learn more about coding via dumped .m files where all the valuable syntax is located. It was the whole point of starting to learn pen-testing.
Are there any tools to view the actual code of a binary? Btw, all this stuff is fine for Obj-C but what about Swift binaries? Cycript is the way to go?
I've been reading tons of tutorials on iOS security but a lot of them seem to pre-date iOS 8. Some say use class-dump, some say use class-dump-z etc. Are there any current tutorials that are super thorough from basic of clutch all the way up to hooking into runtime?
Thanks