From the course: Ethical Hacking: Mobile Devices and Platforms

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

iOS applications and vulnerabilities

iOS applications and vulnerabilities - iOS Tutorial

From the course: Ethical Hacking: Mobile Devices and Platforms

Start my 1-month free trial

iOS applications and vulnerabilities

- [Instructor] An iOS application interacts only with the directories inside its sandbox. During installation, iOS generates a UUID and creates a number of container directories for the application inside the sandbox directory. Each container directory has a specific role. The Bundle Container holds what's known as the application bundle, and the Data Container holds runtime data for both the application and the user. The Data Container is further divided into a number of sub-folders that the application can use to sort and organize its data. The application bundle is a directory called the application name with .app appended. For example, Batman.app. This directory contains the application and its resources. For security purposes, this directory has signed its installation time, and any changes to the directory will prevent the application launching. The Data Container is a collection of data folders used by the application, including three standard folders. The Documents folder is…

Contents