Our primary objective was to explore the magnitude of the iOS vulnerability as well as what could be accomplished via javascript attacks against various versions of iOS. We quickly realized that the captive portal attack can be used to
Our primary objective was to explore the magnitude of the iOS vulnerability as well as what could be accomplished via javascript attacks against various versions of iOS. We quickly realized that the captive portal attack can be used to