Posted by: David Harley | January 17, 2013

Pentesting and iOS data

Pentesting is a bit outside the remit of this blog, but if iOS data interception does feature on your list of concerns, here’s a link you might find useful: ios data interception.

While there’s always a risk that sound low-level(-ish) information will be misused by the people for whom a responsible pentester is ultimately aiming to make life more difficult, the article assumes that the reader will “own and control the iOS device so attacks involving rogue data interception” are not covered.

David Harley CITP FBCS CISSP
Small Blue-Green World/AVIEN/Mac Virus/Anti-Malware Testing
ESET Senior Research Fellow

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

%d bloggers like this: