- Mobile Application Penetration Testing
- Vijay Kumar Velu
- 220字
- 2021-07-16 12:46:44
The iOS application structure
Now that we have understood the iOS security model and its permissions, we will see how all the compiled application code, resources, and application metadata required to define a complete application are zipped and signed with the developer's certificate and finally issued as an iOS app store package (iPA). The structural representation of an iOS application would typically be as shown in this diagram:

When an iPA file is opened with any archiving software such as 7-Zip, WinRAR, and so on, you can see the following:
Payload
: This folder contains all the application dataApplication.app
: This folder contains all the following along with static images and other resourcesApp binary
: This is the binary executableBundle Resources
: All the resources required by the app binary are stored hereEmbedded.mobileprovision
: This file is the original provisioning file packaged with the application, and it helps the developers re-sign an iOS application without requiring XcodeCodeSignature
: This is responsible for verifying that every single byte within the.app
file is exactly the same as when the application was signed by the developer
iTunesArtwork
: This is an optional file, which is used by iTunesConnect when displaying your app's logo in the StoreiTunesMetadata.plist
: Contains the relevant application metadata, including details such as the developer's name, bundle identifier, and copyright information
推薦閱讀
- ETL數據整合與處理(Kettle)
- 數據庫基礎與應用:Access 2010
- Python廣告數據挖掘與分析實戰
- Oracle RAC 11g實戰指南
- 數據庫應用基礎教程(Visual FoxPro 9.0)
- iOS and OS X Network Programming Cookbook
- Python數據分析:基于Plotly的動態可視化繪圖
- Sybase數據庫在UNIX、Windows上的實施和管理
- Ceph源碼分析
- 智能數據時代:企業大數據戰略與實戰
- 數據科學工程實踐:用戶行為分析與建模、A/B實驗、SQLFlow
- 計算機應用基礎教程上機指導與習題集(微課版)
- 編寫有效用例
- Spark分布式處理實戰
- 數據修復技術與典型實例實戰詳解(第2版)