Solved

iPhone Filesystem or CLI access

Posted on 2014-01-17
3
626 Views
Last Modified: 2014-01-23
I saw an article on CNN today that says the Starbucks iOS app stores the username and password unencrypted, and all a hacker would need is a laptop, and iphone the user left behind.

I have the starbucks app on my iPhone and wanted to see it first hand. I tried using Putty and Windows Explorer to connect to my iPhone with no luck.

I also read that you would need to install OpenSSH to connect to an iPhone over WiFi, but to install OpenSSH, you would need to jailbreak the phone (that's what I read).

Question:
How do I connect to the command line or filesystem of the iPhone without jailbreaking it. More specifically, how do I get access to this file:
/Library/Caches/com.crashlytics.data/com.starbucks.mystarbucks/session.clslog

Certain apps allow you access to some iPhone directories, but nothing allows full filesystem access.
0
Comment
Question by:pzozulka
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
Peter Loobuyck earned 250 total points
ID: 39790356
Although the password is in cleartext, you need access to the phone system. Apple blocks that by default. So unless your iPhone is hacked you can't get to it.
And to hack a phone a physical connection is required.
0
 
LVL 17

Assisted Solution

by:Sikhumbuzo Ntsada
Sikhumbuzo Ntsada earned 250 total points
ID: 39790401
Your best shot is jailbreak - Apple would go down in a day if all of us could just have access to the phone'a phile system out of the box.

I have a jail broken iPhone, you can install iFile as well, it gives you a windows like folder structure. You can the navigate to where logs are and open using text editor.
0
 
LVL 7

Expert Comment

by:Peter Loobuyck
ID: 39790552
That is true, nut a jailbroken iPhone is an open door. Withouten adding security yourself, anyone can access it
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

     Intro      In this article, I will show you how to parse a JSON in Swift using an open source library called SwiftyJSON (https://github.com/SwiftyJSON/SwiftyJSON). If you haven't heard of a JSON before, it stands for JavaScript Object Notation…
There is a security feature on iOS devices that is nearly impenetrable when it has been activated.  This article will provide some possible solutions as well as necessary steps to take to ensure you do not end up with a locked device.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now