Skip to content
Menu  
  • Contact Us

CertCube Labs

– Blog on insane exploitation Concepts

  • Home
  • IoT pentesting
  • OSCP Study material
    • offensive-exploitation
      • Searchsploit Cheat Sheet
      • Tools Allowed in OSCP
      • OSCP – Enumeration Cheatsheet & Guide
      • OSCP – Msfvenom All in One
      • RCE with log poisoning Attack Methodologies
      • Pivoting and SSH Port forwarding Basics -Part 1
      • Pivoting & Port forwarding methods – part2
    • Stack based Buffer-overflow
      • OSCP – Detail Guide to Stack-based buffer Overflow – 1
      • OSCP – Detail Guide to Stack-based buffer Overflow – 2
      • OSCP – Detail Guide to Stack-based buffer Overflow – 3
      • OSCP – Detail Guide to Stack-based buffer Overflow – 4
      • OSCP – Detail Guide to Stack-based buffer Overflow – 5
      • OSCP – Detail Guide to Stack-based buffer Overflow – 6
      • OSCP – Detail Guide to Stack-based buffer Overflow – 7
      • OSCP – Detail Guide to Stack-based buffer Overflow – 8
      • OSCP – Detail Guide to Stack-based buffer Overflow – 9
    • SEH based Buffer Overflow
      • SEH Based Buffer overflow
      • OSCP SEH based buffer overflow – Part 2
  • Infrastructure Pentest
    • Linux-Pentesting
      • Linux privilege Escalation methods
      • Linux Privilege Escalation all in one
      • Reverse Shell Cheat Sheet
      • Linux Privilege Escalation – Tools & Techniques
      • Linux detailed Enumeration – Commands
      • Linux Privilege Escalation – SUDO Rights
      • SUID Executables- Linux Privilege Escalation
      • Back To The Future: Unix Wildcards Injection
      • Restricted Linux Shell Escaping Techniques
      • Restricted Linux shells escaping techniques – 2
    • Windows-Pentesting
      • Windows Privilege Escalation Methods
      • Windows Attack Anatomy
      • Beginner Friendly Windows Privilege Escalation
      • Windows Privilege Escalation Guide – part 1 | Tools
      • Windows Privilege escalation – Part 2 | Enumeration
      • Windows privilege escalation – part 3 | Kernal-Exploits
      • Windows Kernel Exploitation – part 4 | Vulnerabilities
      • Herpaderping process– Evading Windows Defender Security
    • Active Directory Pentesting
      • AD Recon For Beginners
      • Powershell Restrictions bypasses
      • Kerberoasting initial: AS-REP Roasting
      • Kerberoasting Simplified
      • Kerberoasting Common tools
      • Pass the hash: A Nightmare still alive!
      • PowerShell Remoting For pentesters Cheatsheet
      • PowerUp Cheatsheet
      • Active Directory privilege escalation cheat sheet
      • AD exploitation Powershell Cheatsheet
      • Powershell Scripts Execute without Powershell
    • web-specific
      • OvertheWire Natas 1 to 34 Full writeup
      • CHEATSHEET – LFI & RCE & WEBSHELLS
      • Web Shells & Exploitation Fundamentals
      • WebShells & Exploitation – LFI to RCE
      • Advanced SQL Injections with LoadFile and Outfile
      • Wfuzz- The power of evil
      • AWAE Exam Review
      • Thick client Testing
  • Mobile AppSec
    • iOS-Pentesting
      • iOS IPA Architecture and JailBreak IOS 13.4.1
      • The Anatomy of the iOS file system in Depth -101
      • Build an IOS pentesting lab via XCode Simulator
      • Build the IPA From Device and IPA Container Analysis
      • Local Data Storage Of iPhone IPA from IOS device
      • Local Storage Analysis of IPA from the attacker device
      • Insecure Data storage Analysis of iOS Applications
      • Decrypting IOS apps Essentials
    • Android Pentesting
      • Android SSL pinning bypass with Frida
      • Creating Rooted AVD in Android Studio
  • Certcube-trainings
    • offensive CTF
    • enterprise pentester training
    • How to start your career into cyber security
  • Contact Us

CertCube Labs

Tag: iOS static code analysis

Build the IPA From Device and  IPA Container Analysis
mobile application security

Build the IPA From Device and IPA Container Analysis

Posted on 14th May 202015th May 2020 | by c3rtcub3_labs

First Lets build the IPA from the Phone : – the IPA container consists of all the files that come […]

Leave a Comment on Build the IPA From Device and IPA Container Analysis

Categories

  • AD exploitation & Post exploitation (11)
  • All Blog (44)
  • buffer overflow (11)
  • cloud Security (2)
  • IoT pentesting (6)
  • Linux privilege escalation (14)
  • mobile application security (7)
  • OSCP Study material (32)
  • Windows-Pentesting (12)

Recent Comments

  • pravat sahoo on Windows Privilege Escalation Methods
  • megan on Windows Privilege Escalation Methods
  • tiny thunder on WebShells & Exploitation – LFI to RCE
  • travis on OSCP – Msfvenom All in One
  • homepage on OSCP – Msfvenom All in One

CertCube Labs

  • Email
  • facebook
  • twitter
  • instagram
  • linkedin
© Copyrights 2021, CertCube Labs A theme by MintTM
Proudly powered by WordPress

WhatsApp us for trainings & demos