Could find an awesome work around for this issue with Frida (need python3, pip install frida-tools
) and Objection (pip3 install objection
)
Install Frida on IOS device.
Connect IOS device with developer / attacker machine via USB cable and in the machine type in frida-ps -U
to get app PID and name
Use Objection -g <app PID> explore
And inside objection use env
to view application data paths
OWASP.iGoat-Swift on (iPhone: 11.1.2) [usb] # env
Name Path
----------------- ------------------------------------------------------------------------------------------- BundlePath
/var/containers/Bundle/Application/3ADAF47D-A734-49FA-B274-FBCA66589E67/iGoat-Swift.app
CachesDirectory
/var/mobile/Containers/Data/Application/8C8E7EB0-BC9B-435B-8EF8-8F5560EB0693/Library/Caches
DocumentDirectory
/var/mobile/Containers/Data/Application/8C8E7EB0-BC9B-435B-8EF8-8F5560EB0693/Documents
LibraryDirectory
/var/mobile/Containers/Data/Application/8C8E7EB0-BC9B-435B-8EF8-8F5560EB0693/Library
Thanks to https://book.hacktricks.xyz/ios-pentesting