Chapter 5. Sealing up Side Channel Data Leakage
"Even if you're on the right track, you'll get run over if you just sit there." | ||
--Will Rogers |
In the previous chapter, we studied about how to view or intercept iOS device's network traffic and you learned how to access the backend web APIs and check the transport layer protection. In this chapter, we will look forward to the sensitive data leakage done via various channels.
In this chapter, we will look at the following topics:
- Data leakage via application screenshot
- Pasteboard leaking sensitive information
- Device logs leaking application sensitive data
- Keyboard cache capturing sensitive data
Data leakage via application screenshot
One of the features of iOS is that it takes a screenshot of the application ...
Get Learning iOS Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.