Analyzing an iOS application goes beyond looking at the IPA file. To get the full picture, you also need to understand how it interacts with the filesystem and what data it stores there. In the second video in our iOS application hacking series, we’ll explore some common methods that applications use to store data and how to recognize and analyze the artifacts they leave behind. We’ll also cover iOS data protection and demonstrate how to examine file protection attributes using runtime instrumentation.
Previous video Next video