In this article, we will look at the different ways in which
applicatons can store data locally on the device and look at how secure
these methods are.
We will be performing some of these demonstrations in a sample app that you can download from my github account. For the CoreData example, you can download the sample app from here
One of the other things that we will doing different in this
example is that we will be running the application on the IOS simulator
using Xcode rather than on the device and hence will be analyzing the
application on our computer rather than on the device. This is just to
demonstrate that you can perform all the steps performed before in previous
articles on your system as well by running the application via Xcode.
Optionally, you can simply run the application on your device using the
steps mentioned here.
==> Read More
Monday, October 21, 2013
Home
»
Application Security
» Bài đang xem
IOS Application Security Part 20 – Local Data Storage (NSUserDefaults, CoreData, Sqlite, Plist files)
Subscribe to:
Post Comments (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)
No comments:
Post a Comment