Summary

You learned how sensitive data gets leaked insecurely via different channels, such as snapshots, logs, cache and so on, and how to prevent it. Being stolen is one of the highest risks for handheld devices and if your sensitive information, such as credit card numbers, username, password, OAuth tokens, company sensitive data and so on is getting leaked, then it's a considerable risk.

In the next chapter, we will study how to analyze iOS binary for security issues.

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.