Learning iOS Penetration Testing by Swaroop Yermalkar

Learning iOS Penetration Testing by Swaroop Yermalkar

Author:Swaroop Yermalkar [Yermalkar, Swaroop]
Language: eng
Format: azw3, epub
Publisher: Packt Publishing
Published: 2016-01-07T00:00:00+00:00


Data protection mechanism has been implemented by iOS, in which the keychain having sensitive data is protected with another layer of encryption and is tied to the user's passcode. Data protection mechanism is designed to protect the user's data in case a device is lost or stolen. So the encryption offered by the data protection API is dependent on the strength of the user's passcode. The problem is that, again, Apple does not force the user to set a password; users can use their devices without a passcode. Also, in most cases, users keep a simple four-digit password that could be easily cracked with bootrom vulnerability.

There are different conditions depending on which a developer can decide when a keychain item can be readable by an application. These various conditions are known as data protection accessibility constants that can be classified as:

kSecAttrAccessibleWhenUnlocked

kSecAttrAccessibleAfterFirstUnlock

kSecAttrAccessibleAlways

kSecAttrAccessibleWhenUnlockedThisDeviceOnly

kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly

kSecAttrAccessibleAlwaysThisDeviceOnly



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.