iPhone Backup Files. A Penetration Tester's Treasure

In a penetration test it is usually impossible to acquire permission to attack the CEO's cell phone. But what if the CEO's workstation is in scope and the CEO has an iPhone synced with a workstation? What if the CEO's iPhone backup files are resident on this workstation? Would that be in scope? The...
By
Darren Manners
February 7, 2012

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg