A penetration testing lab for mobile device interception is conceptualized in the, Setting up the wireless pentesting lab for mobile devices, recipe of this chapter. We have to configure an iOS device to force step 2 (described in the first recipe) to follow a network proxy. Let us learn in this recipe how to do this in iOS devices.
An iOS device, along with other necessities of lab setup like Wi-Fi network and a laptop with web proxy tools (as discussed in the first recipe of this chapter) are required.
iOS provides a proxy as a feature to iDevice users. This makes it very easy for users or attackers to set up traffic interception for iOS applications. The device proxy settings are global and apply for applications too.
The settings can be configured by navigating to settings in an iPhone or iPad.
For this, go to Wi-Fi settings and select the Wi-Fi you wish to connect to; there you can see Proxy Settings under Advanced Options...