Which mobile device vulnerability is targeted when a threat actor reverse engineers a mobile app to see how it creates and stores keys in the iOS Keychain?
- insecure storage
- passcode vulnerabilities and biometric integrations
- certificate pinning
- using known vulnerable components
Explanation & Hint: An attacker could use static analysis or reverse engineering to see how applications create and store keys in the iOS Keychain. |