Book Image

Learning iOS Security

Book Image

Learning iOS Security

Overview of this book

Table of Contents (13 chapters)

Chapter 6. Debugging and Conclusion

Every environment is different. Understanding the internal workings of an iOS device enables you to isolate items that you might consider to be a security threat for your particular environment that we haven't identified in this book. In addition, learning more about these devices is just plain cool! In this chapter, we're going to look at debugging and forensic data collection. These both showcase what kind of data can be pulled off from devices and teaches you more about the devices that you're securing.

As we've showcased throughout this book, Apple does a good job of protecting sensitive data on devices. In addition, application vendors have a lot of tools to keep your data secure as well. However, computers being what they are, some data can be obtained from them. In this chapter, we're going to cover the following topics:

  • Xcode

  • Diving deeper into libimobiledevice

  • App communications such as identifying devices and network communications

  • Apple IDs and...