diff --git a/demos/ios/MASVS-RESILIENCE/MASTG-DEMO-0088/MASTG-DEMO-0088.md b/demos/ios/MASVS-RESILIENCE/MASTG-DEMO-0088/MASTG-DEMO-0088.md index e1c0f10f44..f0eda51c97 100644 --- a/demos/ios/MASVS-RESILIENCE/MASTG-DEMO-0088/MASTG-DEMO-0088.md +++ b/demos/ios/MASVS-RESILIENCE/MASTG-DEMO-0088/MASTG-DEMO-0088.md @@ -3,7 +3,7 @@ platform: ios title: Testing Jailbreak Detection code: [swift] id: MASTG-DEMO-0x88 -test: MASTG-TEST-0088 +test: MASTG-TEST-0x88 --- ### Sample @@ -27,4 +27,4 @@ The output reveals the use of file permissions, protocol handlers and file direc ### Evaluation -The test fails because jailbreak detection checks implemented in the app. +The test passes because jailbreak detection checks are implemented in the app. diff --git a/tests-beta/ios/MASVS-RESILIENCE/MASTG-TEST-0x88.md b/tests-beta/ios/MASVS-RESILIENCE/MASTG-TEST-0x88.md index cc3dac2c8c..d63fb8de8c 100644 --- a/tests-beta/ios/MASVS-RESILIENCE/MASTG-TEST-0x88.md +++ b/tests-beta/ios/MASVS-RESILIENCE/MASTG-TEST-0x88.md @@ -1,6 +1,6 @@ --- platform: ios -title: Testing Jailbreak Detection +title: Runtime Use of Jailbreak Detection Techniques id: MASTG-TEST-0x88 type: [dynamic] weakness: MASWE-0097 @@ -8,7 +8,7 @@ weakness: MASWE-0097 ## Overview -The test verifies that a mobile application can identify whether if the iOS device it is running on a jailbroken device. Jailbreaking removes built-in security restrictions on the device, potentially exposing sensitive information and increasing the risk of unauthorised access. +The test verifies that a mobile application can identify if the iOS device it is running on a jailbroken device. Jailbreaking removes built-in security restrictions on the device, potentially exposing sensitive information and increasing the risk of unauthorized access. ## Steps