- Mobile Application Penetration Testing
- Vijay Kumar Velu
- 220字
- 2021-07-16 12:46:44
The iOS application structure
Now that we have understood the iOS security model and its permissions, we will see how all the compiled application code, resources, and application metadata required to define a complete application are zipped and signed with the developer's certificate and finally issued as an iOS app store package (iPA). The structural representation of an iOS application would typically be as shown in this diagram:
When an iPA file is opened with any archiving software such as 7-Zip, WinRAR, and so on, you can see the following:
Payload
: This folder contains all the application dataApplication.app
: This folder contains all the following along with static images and other resourcesApp binary
: This is the binary executableBundle Resources
: All the resources required by the app binary are stored hereEmbedded.mobileprovision
: This file is the original provisioning file packaged with the application, and it helps the developers re-sign an iOS application without requiring XcodeCodeSignature
: This is responsible for verifying that every single byte within the.app
file is exactly the same as when the application was signed by the developer
iTunesArtwork
: This is an optional file, which is used by iTunesConnect when displaying your app's logo in the StoreiTunesMetadata.plist
: Contains the relevant application metadata, including details such as the developer's name, bundle identifier, and copyright information