GreyCampus Logo

About

Contact


Premium Resources
Training Courses
Free Resources
Open CampusBlogMock ExamsDownloadables

IOS | Ethical Hacking


IOS



IOS uses proprietary software. The attacks on these phones are limited since they are not open source systems.


IOS
Image Source: https://intellipaat.com/tutorial/ios-tutorial/ios-architecture/


Types of IOS Attacks:


Jailbreaking:


Jailbreaking may put the device at risk. It is done to gain administrative privileges and to download third-party application extensions, etc. Though, the device may lose its warranty, get infected with malware, drop in performance, etc. There are three ways jailbreaking can be done-


Tethered:


After a device is jailbroken, it will no longer have a patched kernel; it might go to a partially functioning state and requires re-jailbreaking using the same computer.


Semi-tethered:


When the device is turned off and on, it will no longer be jailbroken. The device can be used for normal functions.


Untethered:


The device once jailbroken remains jailbroken, and the kernel will be patched completely after reboot.


Countermeasures:



  • Do not jailbreak the device.


  • Apply strong encryption.


  • Always connect to safe networks.


  • Follow common security guidelines.


  • Do not open links/attachments from unknown sources.






GreyCampus Logo

Company
AboutContactTerms of UsePrivacy Policy
Bootcamps
Data Science CoursePower BI CourseApplied Generative AI CourseCertificate Program in Data Science and Machine Learning