From the course: iOS Development: Security
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Data leakage through app screenshots - iOS Tutorial
From the course: iOS Development: Security
Data leakage through app screenshots
- I am going to demonstrate another data leakage problem, we'll use the Pasteboard demo app from the previous lesson. If you want to follow along with me open the project from the exercise files folder chapter 2 02 09 begin. We already made the necessary changes to prevent data leakage through the Pasteboard. However, our app still has still a severe security flaw. Let's run the app. I fill in the user name 'secure user' and the password 'super secret password' Now, I hit the home button this will move the app to the background. If I tap the home button twice we can see the app switcher with our app screen shot, the screenshot clearly shows all the login credentials. Whenever, we send an app to the background IOS takes a snapshot of the application's current screen, the snapshot gets saved within the apps and box as you'll see in moment. We'll use Iexplorer, an app that lets us see a lot of our devices internal files. I've gone ahead and connected my Iphone to this computer…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Purpose strings2m 7s
-
(Locked)
Request authorization for system features4m 7s
-
(Locked)
Adding the missing purpose string1m 34s
-
Exposing sensitive data through copying and pasting2m 16s
-
(Locked)
The pasteboard spy app2m 24s
-
(Locked)
Prevent pasteboard leakage without coding1m 11s
-
(Locked)
Prevent pasteboard leakage with coding2m 11s
-
(Locked)
Using an app-specific pasteboard5m 33s
-
(Locked)
Data leakage through app screenshots2m 16s
-
(Locked)
Clearing data before moving to the background3m 7s
-
(Locked)
Obscuring the snapshot before moving to the background3m 30s
-
(Locked)
Hacking the UserDefaults4m 40s
-
(Locked)
-
-
-
-
-