Friday, December 18, 2015

iOS Application Security Part 39 – Sensitive information in memory | mSeclabs Mobile Security

In this article, we will look at analyzing the memory contents of an iOS
application. iOS applications may store sensitive information like
passwords, session IDs etc in the memory of the application without
releasing them. In some cases, releasing these variables may not be an
option. For e.g, it might be required for the application to send an
authentication token with every request and hence there has to be a
reference to it in the memory somewhere. Even though these variables
might be encrypted when stored locally in the application, these
variables will be in their unencryped format while the application is
running. Hence, analyzing the contents of the memory is an important
thing while pentesting an iOS application. If there are some important
properties or instance variables that are not required, they should be
released from the memory.



Read more at mSeclabs team website : 

iOS Application Security Part 39 – Sensitive information in memory | mSeclabs Mobile Security