-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Learning iOS Penetration Testing
By :
Many times, application logs the input data to ease the debug process. Now, if an application is logging sensitive information, then its data will be captured on device logs. An attacker can easily dump device logs and retrieve the user's sensitive information.
Let's follow the given steps to capture device logs that are leaking sensitive information:
You can use the Organizer utility provided with Xcode. Connect the iDevice to Mac, start the Organizer and dump the device logs:

You can automate this process using the idb tool. Use the Log option to capture all device logs and check whether the iDevice is leaking any sensitive information:

This issue arises when the developers forget to remove logs during the release of the application. So, make sure that you have not enabled logs after debug mode.
Change the font size
Change margin width
Change background colour