Register
15:00
Stop
CEH - Hacking Mobile Platforms - Hacking iOS
Advanced
1/15
Scenario: You are a security consultant hired to perform a penetration test on a client's iOS application. The application allows users to store confidential documents. During your assessment, you discover that the app generates temporary copies of these documents during viewing but fails to remove them properly. Which attack technique would be most effective to extract these sensitive files from the device?
a.
Using a Man-in-the-Middle attack to intercept document transfer between the app and remote servers
b.
Performing a file system dump after the app has been used and analyzing the temp directories for residual data
c.
Performing runtime manipulation with Frida to hook into the document viewing functions and capture file contents
d.
Extracting the IPA file, decompiling it, and searching for hardcoded document storage paths in the source code
Advanced