TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bypassing OpenSSL Certificate Pinning in iOS Apps

32 pointsby silentehover 10 years ago

3 comments

sjtgrahamover 10 years ago
I don't even attempt to circumvent SSL pinning. IMO it's easier and safer to use Cydia substrate to decorate the networking classes to print args and return values to the console. I've reversed a few APIs in this way, including a bank's.
评论 #8853230 未加载
jrochkind1over 10 years ago
&gt; From a penetration testing perspective, this may cause practical problems<p>I was super confused what they were talking about, until I remembered that &quot;penetration testing&quot; really just means &quot;penetration&quot;, not &quot;testing&quot;, it&#x27;s just a euphemism for &quot;attacking&quot;. I think?
评论 #8853071 未加载
评论 #8854008 未加载
mwcampbellover 10 years ago
Wouldn&#x27;t it be much harder to patch the binary if it were stripped? Is it not common to strip release builds of iOS apps?
评论 #8853585 未加载