Every environment is different. Understanding the internal workings of an iOS device enables you to isolate items that you might consider to be a security threat for your particular environment that we haven't identified in this book. In addition, learning more about these devices is just plain cool! In this chapter, we're going to look at debugging and forensic data collection. These both showcase what kind of data can be pulled off from devices and teaches you more about the devices that you're securing.
As we've showcased throughout this book, Apple does a good job of protecting sensitive data on devices. In addition, application vendors have a lot of tools to keep your data secure as well. However, computers being what they are, some data can be obtained from them. In this chapter, we're going to cover the following topics:
Xcode
Diving deeper into
libimobiledevice
App communications such as identifying devices and network communications
Apple IDs and...