"Even if you're on the right track, you'll get run over if you just sit there."
In the previous chapter, we studied about how to view or intercept iOS device's network traffic and you learned how to access the backend web APIs and check the transport layer protection. In this chapter, we will look forward to the sensitive data leakage done via various channels.
In this chapter, we will look at the following topics:
One of the features of iOS is that it takes a screenshot of the application ...