O'Reilly logo

Learning iOS Penetration Testing by Swaroop Yermalkar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Sealing up Side Channel Data Leakage

 

"Even if you're on the right track, you'll get run over if you just sit there."

 
 --Will Rogers

In the previous chapter, we studied about how to view or intercept iOS device's network traffic and you learned how to access the backend web APIs and check the transport layer protection. In this chapter, we will look forward to the sensitive data leakage done via various channels.

In this chapter, we will look at the following topics:

  • Data leakage via application screenshot
  • Pasteboard leaking sensitive information
  • Device logs leaking application sensitive data
  • Keyboard cache capturing sensitive data

Data leakage via application screenshot

One of the features of iOS is that it takes a screenshot of the application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required