http://www.enterprisenetworkingp ... php/10952_3892776_1 Three Steps to a Cracked iPhone 1. Identify the victim's mobile carrier from their phone number 2. Create an apparently verified .mobileconfig configuration profile which looks like it comes from their carrier or employer, which diverts http (and https) traffic through the evil proxy 3. Send the victim an SMS to trick them into downloading the new configuration profile . |