January 2016
Beginner
204 pages
3h 54m
English
"Even if you're on the right track, you'll get run over if you just sit there." | ||
| --Will Rogers | ||
In the previous chapter, we studied about how to view or intercept iOS device's network traffic and you learned how to access the backend web APIs and check the transport layer protection. In this chapter, we will look forward to the sensitive data leakage done via various channels.
In this chapter, we will look at the following topics:
One of the features of iOS is that it takes a screenshot of the application ...
Read now
Unlock full access