Jailbreak Detection Bypass Summary :Jailbreak is a technique that allows one to easily gain unrestricted root access to the system files. It was analyzed that the application lacks proper Jailbreak and Emulator Detection checks which are bypassable. OWASP Category: M3: 2016 Insecure Communication Severity : Medium Complexity : Easy From : Remote / External Steps to Reproduce: Proof of Concept : Attached in the Video Impact : If attacker gets root access to the application, an adversary can access the source code of the application, database of the application and modify it. An adversary can read cookies and can modify the functions present within the application. Affected Path: Entire Application Recommendations : The application should implement proper Jailbreak and Emulator Detection checks Pinning. Boolean based values should not be given in response which can be easily modified by an automated tool such as Frida instead try encrypting the response. References : https://resources.infosecinstitute.com/topic/ios-application-security-part-44-bypassing-jailbreak-detection-using-xcon/https://www.appdome.com/how-to/mobile-malware-prevention/jailbreak-detection-bypass/protect-ios-apps-from-jailbreak-detection-bypass-tools/ https://www.trustedsec.com/blog/introducing-ihide-a-new-jailbreak-detection-bypass-tool/ Proof of Concept :