Videos

Published on August 20th, 2011 📆 | 5295 Views ⚑

0

iOS App Spoofing through plist Hijacking


iSpeech.org



This demo shows a possible vulnerability that will exist in future iOS apps due to Apple's policy on UDID use by developers in iOS 5.

If developers want to maintain the same translucent identification between the app and its web service, it forces them to generate their own unique IDs and store them within the user accessible plist files.

In this demo the HijackMe application stores its users unique ID within a plist. When communicating with its web service it fetches that id to let the service identify the user.

the AppHijacker accesses the HijackMe plist file and modifies the id.





the results are clear.

note: this is a conceptual demo. I understand that these kinds of apps would never make it through Apple's screening process.

source

Tagged with:



Comments are closed.