Text this: Threat profiling based on vulnerability assessment and penetration testing: iphone case study