iOS Mobile Penetration Test

iOS-Apple-iconSetup Device

Tools

Install iOS Binaries

Exploring iOS File System

Decrypting iOS Applications

HTTP/HTTPS interception

Review Vulnerabilities

Insecure data storage

Unintended data leakage

Static analysis

Run-time analysis and manipulation

Bypass Jailbreak Detection

Security Decisions Via Untrusted Inputs

Client side injection

Poor Authentication And Authorization