Which mobile device vulnerability is targeted when a threat actor reverse engineers a mobile app to see how it creates and stores keys in the iOS Keychain?
- insecure storage
- passcode vulnerabilities and biometric integrations
- certificate pinning
- using known vulnerable components
Explanation: An attacker could use static analysis or reverse engineering to see how applications create and store keys in the iOS Keychain.
Exam with this question: 7.3.3 Quiz - Cloud, Mobile, and IoT Security Answers
Please login or Register to submit your answer