Skip to content

Latest commit

 

History

History
25 lines (13 loc) · 1.59 KB

0x02e_OMTG-ENV_iOS.md

File metadata and controls

25 lines (13 loc) · 1.59 KB

OMTG-ENV-009 Test Basic Jailbreak Detection

Overview

iOS implements containerization so that each app is restricted to its own sandbox. A regular app cannot access files outside its dedicated data directories, and access to system APIs is restricted via app privileges. As a result, an app’s sensitive data as well as the integrity of the OS is guaranteed under normal conditions. However, when an adversary gains root access to the mobile operating system, the default protections can be bypassed completely.

The risk of malicious code running as root is higher on jailbroken devices, as many of the default integrity checks are disabled. Developers of apps that handle highly sensitive data should therefore consider implementing checks that either prevent the app from running under these conditions, or at least warn the user about the increased risks.

White-box Testing

(Describe how to assess this with access to the source code and build configuration)

Black-box Testing

[Describe how to test for this issue using static and dynamic analysis techniques. This can include everything from simply monitoring aspects of the app’s behavior to code injection, debugging, instrumentation, etc. ]

Remediation

[Describe the best practices that developers should follow to prevent this issue]

References

OWASP MASVS
  • OWASP MASVS: V6.13: "Verify that the application detects whether it is being executed on a rooted or jailbroken device. Depending on the business requirement, users should be warned, or the app should terminate if the device is rooted."