"Even if you're on the right track, you'll get run over if you just sit there." | ||
--Will Rogers |
In the previous chapter, we studied about how to view or intercept iOS device's network traffic and you learned how to access the backend web APIs and check the transport layer protection. In this chapter, we will look forward to the sensitive data leakage done via various channels.
In this chapter, we will look at the following topics:
Data leakage via application screenshot
Pasteboard leaking sensitive information
Device logs leaking application sensitive data
Keyboard cache capturing sensitive data