O'Reilly logo

Learning iOS Penetration Testing by Swaroop Yermalkar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Connecting with iDevice

In Chapter 1, Introducing iOS Application Security, we had studied that iOS is very similar to a Unix-based system. So, let's log in to the device and check it.

To log in to iDevice, you should have SSH running on iDevice so that you can connect to it using the SSH client. In Cydia, search for OpenSSH and install it, as shown in the following screenshot:

Connecting with iDevice

Then, connect your iDevice to Wi-Fi and check the IP address of your device, as follows:

Connecting with iDevice

Now, from your PC/Mac system, connect to this IP address over SSH using any SSH client. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required