Preface

Apple exclusively developed a mobile operating system, iOS, for Apple's hardware. It ranks second, after Android, in the market of smartphone operating systems. With the change in user preference and rapidly moving technology, users make use of mobile to handle sensitive information, such as personal, healthcare, financial, and so on, on their phones. Companies allow bring your own device (BYOD) policy, which results in corporate data being present on the phones. Therefore, it has become a necessity to secure information that is present on the device in order to protect users' privacy and also fulfill the compliance requirement mandated by the government.

This book, Learning iOS Penetration Testing, discusses common vulnerabilities and security-related shortcomings in iOS applications. It teaches readers to conduct static and dynamic analysis of iOS applications, iDevice exploitation, and iOS forensics basics.

This book will focus on the practical approach to conduct vulnerability assessment and penetration testing of iOS applications from basic to intermediate level, as per industry standards. It will help mobile application developers and information security professionals to find out the commonly known vulnerabilities and ways to mitigate them.