iOS Man-in-the-Middle Threat Simulation
The most popular way to man-in-the-middle an iOS device is by using a malicious configuration profile that installs a root CA on the device. Here we demonstrate that threat in action.
You May Also Like
Why Mobile Security Matters
Managing iOS App Sideloading
Managing Jailbreaks on iOS