Plist Storage
plist (Property List) is a flexible and convenient format for storing application data.Many times a developer makes the mistake of saving sensitive informations like users Credentials/Pin in plist.

Task

In this exercise the app stores data using a Plist file in the application sandbox.Your task is to locate the Plist file and find the sensitive data that it contains.
Once we enter the Username and Password the records are stored successfully in the Plist file in the application Sandbox.
In this example, the Plist file is stored in the below given path:
1
/private/var/mobile/Containers/Data/Application/<AppFolder>/Documents/<Credentials.plist>
Copied!
Download the Plist file to your host machine from the above path using SFTP/SCP.
1
╭─[email protected] ~/Documents/iOS/OWASP_iGoat
2
╰─$ scp [email protected]:/private/var/mobile/Containers/Data/Application/464B6C36-FBB9-4209-AC2C-6793098AB807/Documents/Credentials.plist .
3
[email protected]'s password:
4
Credentials.plist 100% 279 1.5KB/s 00:00
5
╭─[email protected] ~/Documents/iOS/OWASP_iGoat
6
╰─$ ls
7
Credentials.plist
Copied!
Once you download application files, open the Credentials.plist file and you will observe that the sensitive information that is filled via UI is stored insecurely in plain text format.
Credentials.plist
The data stored in the plist file is neither encrypted nor protected. An attacker having access to the device can easily access the plist file and look for sensitive data in plain text format.
So the developers should never store any sensitive information in the plist file as this is not a secured format.
Last modified 3yr ago
Copy link