Does iLEAPP have GitHub Repo, RAT, and Sideloading history? #610
Answered
by
abrignoni
citycritter
asked this question in
Q&A
-
If someone deployed repos, phishing links, RATs, or sideloaded apps from sites like GitHub, would iLEAPP have the history? If so where? |
Beta Was this translation helpful? Give feedback.
Answered by
abrignoni
Nov 16, 2023
Replies: 1 comment 3 replies
-
I don't know what you are talking about.
…On Thu, Nov 16, 2023, 10:05 AM citycritter ***@***.***> wrote:
If someone deployed repos, phishing links, RATs, or sideloaded apps from
sites like GitHub, would iLEAPP have the history? If so where?
—
Reply to this email directly, view it on GitHub
<#610>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AG3DPCYY5NDSONPBNQSDRPTYEYTVNAVCNFSM6AAAAAA7OJ4IOWVHI2DSMVQWIX3LMV43ERDJONRXK43TNFXW4OZVHA2TQNJUGY>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
You are asking for an iOS malware behavioral identification course. I haven't written one yet.
As of today iLEAPP just finds and parses artifacts from an iOS extraction. These artifacts, if properly interpreted, could be used as possible indicators of malware infection. Sadly I don't have the bandwidth to delve into that topic at this moment. Hopefully some other folks can.
Check out the Digital Forensics Discord server. There are tons of knowledgeable people there you can ask about these topics and more.
https://github.com/Digital-Forensics-Discord-Server