iOS Penetration Testing

THREATS, TACTICS AND PROCEDURES TTP
MITRE’S ATT&CK®
iOS Pen Test
Initial Access to iOS by Adversaries
1. Deliver Malicious App via Authorised App Store.
2. Deliver Malicious App via Other Means.
3. Drive-by Compromise.
4. Exploit via Charging Station or System.
5. Exploit via Radio Interfaces.
6. Install Insecure or Malicious Configuration.
7. Lockscreen Evasion.
8. Masquerade as Legitimate Apps.
9. Supply Chain Compromise.
Persistence of Adversaries in the iOS
1. Code Injection.
2. Modify OS Kernel or Boot Partition.
3. Modify System Partition.
Privilege Escalation of Adversaries in the iOS
1. Code Injection.
2. Exploit iOS Vulnerability.
Defence Evasion of Adversaries in the iOS
1. Application Discovery.
2. Code Injection.
3. Device Lockout.
4. Disguise Root/Jailbreak Indicators.
5. Download New Code at Runtime.
6. Evade Analysis Environment.
7. Install Insecure or Malicious Configuration.
8. Masquerade as Legitimate Apps.
9. Modify OS Kernel or Boot Partition.
10. Modify System Partition.
11. Obfuscated Files or Information.
Credential Access of the iOS by Adversaries


1. Access stored Application Data.
2. Capture clipboard Data.
3. Capture SMS Messages.
4. Input Capture.
5. Input Prompt.
6. Keychain.
7. Network Traffic Capture or Redirection.
8. URL Scheme Hijacking.

Discovery of iOS Architecture by Adversaries

1. Application Discovery.
2. Evade Analysis Environment.
3. Location Tracking.
4. Network Service Scanning.
5. System Information Discovery.
6. System Network Configuration Discovery.
Lateral Movement by Adversaries on iOS
1. Exploit Enterprise Resources.
Collection of Data in the iOS by Adversaries

1. Access Calendar Entries.
2. Access Call Logs.
3. Access Contact List.
4. Access Stored Application Data.
5. Capture Audio.
6. Capture Camera.
7. Capture Clipboard Data.
8. Capture SMS Messages.
9. Data from Local System.
10. Input Capture.
11. Location Tracking.
12. Network Traffic Capture or Redirection.
Command and Control of iOS Devices

1. Alternate Network Medium.
2. Commonly Used Port.
3. Domain Generation Algorithms.
4. Remote File Copy.
5. Standard Application Layer Protocol.
6. Standard Cryptographic Protocol.
7. Uncommonly Used Ports.
8. Web Services.

Exfiltration of iOS data

1. Alternate Network Medium.
2. Commonly Used Port.
3. Data Encrypted.
4. Standard Application Layer Protocol.
Impact of iOS Attacks
1. Device Lockout.
2. Generate Fraudulent Advertising Revenue.
3. Manipulate App Store Rankings or Ratings.
4. Modify System Partition.

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.