<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Burp on Jordan Wright</title><link>https://jordan-wright.com/blog/tags/burp/</link><description>Recent content in Burp on Jordan Wright</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 05 Nov 2013 21:50:00 +0000</lastBuildDate><atom:link href="https://jordan-wright.com/blog/tags/burp/index.xml" rel="self" type="application/rss+xml"/><item><title>How to Pentest iPhone Apps with Burp</title><link>https://jordan-wright.com/blog/2013/11/07/how-to-pentest-iphone-apps-with-burp/</link><pubDate>Tue, 05 Nov 2013 21:50:00 +0000</pubDate><guid>https://jordan-wright.com/blog/2013/11/07/how-to-pentest-iphone-apps-with-burp/</guid><description>&lt;img src="https://jordan-wright.com/blog/images/headers/iphone_burp.png" alt="" class="pure-img" &gt;

&lt;h3 id="introduction"&gt;Introduction&lt;/h3&gt;
&lt;p&gt;When looking at the functionality of mobile apps, it&amp;rsquo;s clear that they aren&amp;rsquo;t &lt;em&gt;that&lt;/em&gt; different than web applications. They often just serve as a frontend for the data stored on a central backend server or database. As such, if developers aren&amp;rsquo;t careful to protect these apps, many of the &lt;a href="https://www.owasp.org/index.php/Top_10_2013"&gt;same vulnerabilities&lt;/a&gt; we find in standard web applications (such as injection attacks on unvalidated input) can be exploited by attackers.&lt;/p&gt;
&lt;p&gt;This post will show how to setup the iPhone to work with the popular &lt;a href="http://portswigger.net/burp/download.html"&gt;Burp Suite&lt;/a&gt; so that traffic from apps can be intercepted and tested for vulnerabilities.&lt;/p&gt;</description></item></channel></rss>