hacktricks/ios-pentesting/ios-pentesting-checklist.md
2021-05-18 12:34:46 +00:00

2.7 KiB

iOS Pentesting Checklist

Data Storage

  • Plist files can be used to store sensitive information.
  • ****Core Data SQLite database can store sensitive information.
  • ****YapDatabases SQLite database can store sensitive information.
  • ****Firebase miss-configuration.
  • ****Realm databases can store sensitive information.
  • ****Couchbase Lite databases can store sensitive information.
  • ****Binary cookies can store sensitive information
  • ****Cache data can store sensitive information
  • ****Automatic snapshots can save visual sensitive information
  • ****Keychain is usually used to store sensitive information that can be left when reselling the phone.
  • In summary, just check for sensitive information saved by the application in the filesystem

Keyboards

Logs

Clipboard

Backups

  • ****Backups can be used to access the sensitive information saved in the file system check the initial point of this checklist
  • Also, backups can be used to modify some configurations of the application, then restore the backup on the phone, and the as the modified configuration is loaded some security functionality may be bypassed

Applications Memory

Local Authentication