THREATS, TACTICS AND PROCEDURES TTP
MITRE’S ATT&CK®
iOS Pen Test
Initial Access to iOS by Adversaries
1. Deliver Malicious App via Authorised App Store.
2. Deliver Malicious App via Other Means.
3. Drive-by Compromise.
4. Exploit via Charging Station or System.
5. Exploit via Radio Interfaces.
6. Install Insecure or Malicious Configuration.
7. Lockscreen Evasion.
8. Masquerade as Legitimate Apps.
9. Supply Chain Compromise.
2. Deliver Malicious App via Other Means.
3. Drive-by Compromise.
4. Exploit via Charging Station or System.
5. Exploit via Radio Interfaces.
6. Install Insecure or Malicious Configuration.
7. Lockscreen Evasion.
8. Masquerade as Legitimate Apps.
9. Supply Chain Compromise.
Defence Evasion of Adversaries in the iOS
1. Application Discovery.
2. Code Injection.
3. Device Lockout.
4. Disguise Root/Jailbreak Indicators.
5. Download New Code at Runtime.
6. Evade Analysis Environment.
7. Install Insecure or Malicious Configuration.
8. Masquerade as Legitimate Apps.
9. Modify OS Kernel or Boot Partition.
10. Modify System Partition.
11. Obfuscated Files or Information.
2. Code Injection.
3. Device Lockout.
4. Disguise Root/Jailbreak Indicators.
5. Download New Code at Runtime.
6. Evade Analysis Environment.
7. Install Insecure or Malicious Configuration.
8. Masquerade as Legitimate Apps.
9. Modify OS Kernel or Boot Partition.
10. Modify System Partition.
11. Obfuscated Files or Information.
Collection of Data in the iOS by Adversaries
1. Access Calendar Entries.
2. Access Call Logs.
3. Access Contact List.
4. Access Stored Application Data.
5. Capture Audio.
6. Capture Camera.
7. Capture Clipboard Data.
8. Capture SMS Messages.
9. Data from Local System.
10. Input Capture.
11. Location Tracking.
12. Network Traffic Capture or Redirection.