You studied different formats of iOS local storage, such as SQLite, plist, keychain, and so on. You also learned how an attacker can easily access the sensitive data if the developers are not aware of the possible threats. We then engaged in interesting attacks, such as a SQL injection on an iOS application's local storage. Finally, you came to know about the different ways to conduct security audit of different local data storage formats.
In the next chapter, you will study about intercepting and analyzing iDevice and iOS Simulator's network traffic in order to perform various attacks on web APIs.