<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bernhard+Mueller</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bernhard+Mueller"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bernhard_Mueller"/>
		<updated>2026-05-16T23:39:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236583</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236583"/>
				<updated>2018-01-04T03:29:24Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 9 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:sven.schleier@owasp.org Sven Schleier] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== September 14th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf Version 0.9.4] of the MASVS is now [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf available for download] . This release contains several bug fixes and modifications to security requirements.&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/sushi2k Sven] and he'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236582</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236582"/>
				<updated>2018-01-04T03:28:48Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 9 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:sven.schleier@owasp.org Sven Schleier] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== September 14th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf Version 0.9.4] of the MASVS is now [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf available for download] . This release contains several bug fixes and modifications to security requirements.&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236581</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236581"/>
				<updated>2018-01-04T03:24:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 9 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== September 14th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf Version 0.9.4] of the MASVS is now [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf available for download] . This release contains several bug fixes and modifications to security requirements.&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236250</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=236250"/>
				<updated>2017-12-13T05:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Mobile App Security Education */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 9 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== September 14th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf Version 0.9.4] of the MASVS is now [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf available for download] . This release contains several bug fixes and modifications to security requirements.&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=233297</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=233297"/>
				<updated>2017-09-14T04:47:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== September 14th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf Version 0.9.4] of the MASVS is now [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf available for download] . This release contains several bug fixes and modifications to security requirements.&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=233296</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=233296"/>
				<updated>2017-09-14T04:39:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Main Deliverables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=233295</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=233295"/>
				<updated>2017-09-14T04:37:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Main Deliverables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.4.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.4.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.4.pdf version 0.9.4].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
* OWASP Day Indonesia 2017 - Fixing Mobile AppSec, 09.09.017&lt;br /&gt;
* Confidence (Krakow, Poland) - Pawel Rzepa - Testing Mobile Applications  &lt;br /&gt;
* OWASP AppSec EU 2017 - [http://sched.co/A66j Fixing Mobile AppSec] - [https://2017.appsec.eu/presos/Developer/Fixing%20Mobile%20AppSec%20The%20OWASP%20Mobile%20Project-%20Bernhard%20Mueller%20and%20Sven%20Schleier%20-%20OWASP_AppSec-Eu_2017.pdf Slides], [https://www.youtube.com/watch?v=THJVzf-u7Iw Video] &lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASVS_v0.9.4.pdf&amp;diff=233294</id>
		<title>File:MASVS v0.9.4.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASVS_v0.9.4.pdf&amp;diff=233294"/>
				<updated>2017-09-14T04:36:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231753</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231753"/>
				<updated>2017-07-19T08:08:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: Add own profile link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Dune73|Christian Folini]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Tanyajanca Tanya Janca]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Jeremy_Long Jeremy Long]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Makash|Akash Mahajan]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Tanyajanca Tanya Janca]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having been nominated for the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Nwhysel|Noreen Whysel]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Glenn_%26_Riccardo_ten_Cate Glenn &amp;amp; Riccardo ten Cate]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Jeremy_Long Jeremy Long]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:DanielMiessler|Daniel Miessler]]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Bernhard_Mueller|Bernhard Mueller]]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Bernhard_Mueller&amp;diff=231752</id>
		<title>User:Bernhard Mueller</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Bernhard_Mueller&amp;diff=231752"/>
				<updated>2017-07-19T08:06:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:bernhardmueller.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= Bernhard Mueller = &lt;br /&gt;
Bernhard is an uncertified software security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry he has published many bugs and papers in a variety of fields including Internet protocols, web apps, mobile operating systems, WAFs and others. If you can name it, he has probably broken it at least once. &lt;br /&gt;
&lt;br /&gt;
Since early 2016, he volunteers as a project leader and author for the [https://github.com/OWASP/owasp-mstg OWASP Mobile Security Testing Guide].&lt;br /&gt;
&lt;br /&gt;
=== OWASP Links ===&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide Mobile Security Testing Guide Project Page]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide on GitHub]&lt;br /&gt;
* [https://leanpub.com/mobile-security-testing-guide Mobile Security Testing Guide Early Access Edition on Leanpub]&lt;br /&gt;
* [https://github.com/OWASP/owasp-masvs Mobile Security Verification Standard on GitHub]&lt;br /&gt;
* [https://www.youtube.com/watch?v=THJVzf-u7Iw Fixing Mobile AppSec - AppSec EU Presentation]&lt;br /&gt;
&lt;br /&gt;
=== Some Papers, Talks and Security Advisories ===&lt;br /&gt;
* Attacking Software Tokens – Advanced Reverse Engineering on Android (HITB GSEC 2016)&lt;br /&gt;
* Cisco Call Manager Multiple Vulnerabilities CVE-2014-6271, CVE-2014-8008)&lt;br /&gt;
* ModSecurity multipart / invalid part ruleset bypass (CVE-2014-4528)&lt;br /&gt;
* IBM Director Privilege Escalation (CVE-2009-0880)&lt;br /&gt;
* Microsoft SQL Server “sp_replwritetovarbin” Heap Overflow (CVE-2008-4270)&lt;br /&gt;
* From 0 to 0day on Symbian (2008)&lt;br /&gt;
* Perdition IMAPD Format String Vulnerability (CVE-2007-5740)&lt;br /&gt;
&lt;br /&gt;
=== Online Presence ===&lt;br /&gt;
* [https://www.linkedin.com/in/bernhardm/ Linkedin]&lt;br /&gt;
* [https://twitter.com/muellerberndt Twitter]&lt;br /&gt;
* [https://github.com/b-mueller Github]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Bernhard_Mueller&amp;diff=231751</id>
		<title>User:Bernhard Mueller</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Bernhard_Mueller&amp;diff=231751"/>
				<updated>2017-07-19T08:05:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: Update profile&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:bernhardmueller.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= Bernhard Mueller = &lt;br /&gt;
Bernhard is an uncertified software security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry he has published many bugs and papers in a variety of fields including Internet protocols, web apps, mobile operating systems, WAFs and others. If you can name it, he has probably broken it at least once. &lt;br /&gt;
&lt;br /&gt;
Since early 2016, he volunteers as a project leader and author for the [https://github.com/OWASP/owasp-mstg OWASP Mobile Security Testing Guide].&lt;br /&gt;
&lt;br /&gt;
=== OWASP Links ===&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide Mobile Security Testing Guide Project Page]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide on GitHub]&lt;br /&gt;
* [https://leanpub.com/mobile-security-testing-guide Mobile Security Testing Guide Early Access Edition on Leanpub]&lt;br /&gt;
* [https://github.com/OWASP/owasp-masvs Mobile Security Verification Standard on GitHub]&lt;br /&gt;
* [https://www.youtube.com/watch?v=THJVzf-u7Iw Fixing Mobile AppSec - AppSec EU Presentation]&lt;br /&gt;
&lt;br /&gt;
=== Some Papers, Talks and Security Advisories ===&lt;br /&gt;
* Attacking Software Tokens – Advanced Reverse Engineering on Android (HITB GSEC 2016)&lt;br /&gt;
* Cisco Call Manager Multiple Vulnerabilities CVE-2014-6271, CVE-2014-8008)&lt;br /&gt;
* ModSecurity multipart / invalid part ruleset bypass (CVE-2014-4528)&lt;br /&gt;
* IBM Director Privilege Escalation (CVE-2009-0880)&lt;br /&gt;
* Microsoft SQL Server “sp_replwritetovarbin” Heap Overflow (CVE-2008-4270 / MSF: )&lt;br /&gt;
* From 0 to 0day on Symbian (2008)&lt;br /&gt;
* Perdition IMAPD Format String Vulnerability (CVE-2007-5740)&lt;br /&gt;
&lt;br /&gt;
=== Online Presence ===&lt;br /&gt;
* [https://www.linkedin.com/in/bernhardm/ Linkedin]&lt;br /&gt;
* [https://twitter.com/muellerberndt Twitter]&lt;br /&gt;
* [https://github.com/b-mueller Github]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bernhardmueller.png&amp;diff=231750</id>
		<title>File:Bernhardmueller.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bernhardmueller.png&amp;diff=231750"/>
				<updated>2017-07-19T08:05:08Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231237</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231237"/>
				<updated>2017-07-05T03:34:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* July 5th, 2017: Sponsorship Packages Announced */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[:File:MSTG-Sponsor-Packages.pdf|sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231236</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231236"/>
				<updated>2017-07-05T03:33:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* July 5th, 2017: Sponsorship Packages Announced */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of [[https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Sponsorship_Packages sponsorship packages]] will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. 100% of the funds raised go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231235</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231235"/>
				<updated>2017-07-05T03:29:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Why Sponsors? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation to the mobile security project for future use.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. The funds raised&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231234</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231234"/>
				<updated>2017-07-05T03:29:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation for use  in the mobile security project.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. The funds raised&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231233</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231233"/>
				<updated>2017-07-05T03:28:30Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised k go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
* Editing and proofreading by professional editors&lt;br /&gt;
* Graphic design and layout&lt;br /&gt;
* Purchase an ISBN&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation for use  in the mobile security project.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. The funds raised&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231232</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231232"/>
				<updated>2017-07-05T03:27:44Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised k go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
- Editing and proofreading by professional editors&lt;br /&gt;
- Graphic design and layout&lt;br /&gt;
- Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation for use  in the mobile security project.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. The funds raised&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231231</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231231"/>
				<updated>2017-07-05T03:26:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
==Why Sponsors?==&lt;br /&gt;
&lt;br /&gt;
As it turns out, writing a book to a professional standard is a challenging task, even more so if there's 50+ authors that aren't necessarily native speakers. Also, professional editors, graphic designers and layouters don't work for free. Thus, some funds are needed to make the tech book a reality.&lt;br /&gt;
&lt;br /&gt;
100% of the funds raised k go directly into the project budget and will be used to fund production of the final release, including:&lt;br /&gt;
&lt;br /&gt;
- Editing and proofreading by professional editors&lt;br /&gt;
- Graphic design and layout&lt;br /&gt;
- Purchase an ISBN&lt;br /&gt;
&lt;br /&gt;
Any leftover funds will be donated to the OWASP Foundation for use  in the mobile security project.&lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== July 5th, 2017: Sponsorship Packages Announced == &lt;br /&gt;
&lt;br /&gt;
We are happy to announce that a limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. With these packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. The funds raised&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231230</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231230"/>
				<updated>2017-07-05T03:19:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or [[:File:MSTG-Sponsor-Packages.pdf|download as PDF]] ):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MSTG-Sponsor-Packages.pdf&amp;diff=231229</id>
		<title>File:MSTG-Sponsor-Packages.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MSTG-Sponsor-Packages.pdf&amp;diff=231229"/>
				<updated>2017-07-05T03:17:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231228</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231228"/>
				<updated>2017-07-05T03:15:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship Packages =&lt;br /&gt;
With the Mobile Security Testing Guide sponsorship packages, we offer companies opportunities to create brand awareness and maximize visibility in the mobile security space. A limited amount of sponsorship packages will be made available shortly through our crowdfunding campaign. &lt;br /&gt;
&lt;br /&gt;
The following packages will be available (or download as PDF):&lt;br /&gt;
&lt;br /&gt;
=== Good Samaritan (USD 500) ===&lt;br /&gt;
* Listed as supporter on the project website and GitHub&lt;br /&gt;
* Listed as supporter in the printed and ebook versions&lt;br /&gt;
* 5 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== Honourable Benefactor (USD 2,000 / 10 Available) ===&lt;br /&gt;
* Small company logo in the “Honourable Benefactors” section on project website and Github&lt;br /&gt;
* Small company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 10 Paperback Books&lt;br /&gt;
&lt;br /&gt;
=== God Mode Sponsor (USD 4,000 / 5 Available) ===&lt;br /&gt;
* Large company logo in the “God mode sponsors” section on project website and Github&lt;br /&gt;
* Large company logo on the sponsors page of the printed and ebook versions&lt;br /&gt;
* 20 Paperback Books&lt;br /&gt;
&lt;br /&gt;
== Pre-book a package ==&lt;br /&gt;
Contact [mailto:bernhard&amp;amp;#x5B;dot&amp;amp;#x5D;mueller&amp;amp;#x5B;at&amp;amp;#x5D;owasp&amp;amp;#x5B;dot&amp;amp;#x5D;org Bernhard Mueller] to reserve your slot. We will contact you as soon as the packages become available.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231219</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231219"/>
				<updated>2017-07-04T11:56:46Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Main Deliverables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-3.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mstg-mini-3.jpg&amp;diff=231218</id>
		<title>File:Mstg-mini-3.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mstg-mini-3.jpg&amp;diff=231218"/>
				<updated>2017-07-04T11:56:37Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231217</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231217"/>
				<updated>2017-07-04T11:54:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Early-access-mini.jpg|link=https://leanpub.com/mobile-security-testing-guide]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The early access edition contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Early-access-mini.jpg&amp;diff=231216</id>
		<title>File:Early-access-mini.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Early-access-mini.jpg&amp;diff=231216"/>
				<updated>2017-07-04T11:53:36Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231215</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=231215"/>
				<updated>2017-07-04T11:50:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* &amp;quot;Define the industry standard for mobile application security.&amp;quot; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Early-Access Ebook  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Bites.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - Early Access'''&lt;br /&gt;
The Summit Preview contains sample chapters with content on mobile security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230784</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230784"/>
				<updated>2017-06-19T10:41:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: Update Gitbook URL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Preview Release  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Bites.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - OWASP Summit Preview'''&lt;br /&gt;
The Summit Preview contains sample chapters on Android security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230747</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230747"/>
				<updated>2017-06-17T03:53:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Security Engineering in the SDLC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Preview Release  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Bites.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - OWASP Summit Preview'''&lt;br /&gt;
The Summit Preview contains sample chapters on Android security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== June 17th, 2017: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230727</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230727"/>
				<updated>2017-06-16T16:18:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Acknowledgments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Preview Release  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Bites.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - OWASP Summit Preview'''&lt;br /&gt;
The Summit Preview contains sample chapters on Android security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== New Release: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
The full list of contributors, including those with less than 50 additions logged, is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230726</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230726"/>
				<updated>2017-06-16T16:15:47Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Preview Release  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Bites.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - OWASP Summit Preview'''&lt;br /&gt;
The Summit Preview contains sample chapters on Android security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== New Release: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Acknowledgments ==&lt;br /&gt;
&lt;br /&gt;
=== Authors ===&lt;br /&gt;
&lt;br /&gt;
====Bernhard Mueller ====&lt;br /&gt;
&lt;br /&gt;
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for software such as MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity. If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat &amp;quot;Best Research&amp;quot; Pwnie Award.&lt;br /&gt;
&lt;br /&gt;
====  Sven Schleier ====&lt;br /&gt;
&lt;br /&gt;
Sven is an experienced penetration tester and security architect who specialized in implementing secure SDLC for web application, iOS and Android apps. He is a project leader for the OWASP Mobile Security Testing Guide and the creator of OWASP Mobile Hacking Playground. Sven also supports the community with free hands-on workshops on web and mobile app security testing. He has published several security advisories and a white papers about a range of security topics.&lt;br /&gt;
&lt;br /&gt;
=== Co-Authors ===&lt;br /&gt;
&lt;br /&gt;
Co-authors have consistently contributed quality content, and have at least 2,000 additions logged in the GitHub repository.&lt;br /&gt;
&lt;br /&gt;
==== Romuald Szkudlarek ====&lt;br /&gt;
&lt;br /&gt;
Romuald is a passionate cyber security &amp;amp; privacy professional with over 15 years of experience in the Web, Mobile, IoT and Cloud domains. During his career, he has been dedicating spare time to a variery of projects with the goal of advancing the sectors of software and security. He is also teaching at various institutions. He holds CISSP, CSSLP and CEH credentials.&lt;br /&gt;
&lt;br /&gt;
==== Jeroen Willemsen ====&lt;br /&gt;
&lt;br /&gt;
Jeroen is a full-stack developer specialized in IT security at Xebia with a passion for mobile and risk management. He loves to explain things: starting as a teacher teaching PHP to bachelor students and then move along explaining security, risk management and programming issues to anyone willing to listen and learn.&lt;br /&gt;
&lt;br /&gt;
=== Top Contributors ===&lt;br /&gt;
&lt;br /&gt;
Top contributors have consistently contributed quality content with at least 500 additions logged in the GitHub repository.&lt;br /&gt;
&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Alexander Anthuk&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
* Bolot Kerimbaev&lt;br /&gt;
&lt;br /&gt;
=== Contributors ===&lt;br /&gt;
&lt;br /&gt;
Contributors have made a quality contribution with at least 50 additions logged in the GitHub repository.&lt;br /&gt;
&lt;br /&gt;
Jin Kung Ong, Gerhard Wagner, Andreas Happe, Wen Bin Kong, Michael Helwig, Jeroen Willemsen, Denis Pilipchuk, Ryan Teoh, Dharshin De Silva, Anita Diamond, Daniel Ramirez Martin, Claudio André, Enrico Verzegnassi, Prathan Phongthiproek, Tom Welch, Luander Ribeiro, Oguzhan Topgul, Carlos Holguera, David Fern, Pishu Mahtani, Anuruddha&lt;br /&gt;
&lt;br /&gt;
=== Reviewers ===&lt;br /&gt;
&lt;br /&gt;
Reviewers have consistently provided useful feedback through GitHub issues and pull request comments.&lt;br /&gt;
&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Sjoerd Langkemper&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;br /&gt;
&lt;br /&gt;
Many other contributors have committed small amounts of content, such as a single word or sentence (less than 50 additions). The full list of contributors is available on [https://github.com/OWASP/owasp-mstg/graphs/contributors GitHub].&lt;br /&gt;
&lt;br /&gt;
=== Old Version - MSTG &amp;quot;Beta&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive.&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
Mirza Ali, Stephen Corbiaux, Ryan Dewhurst, Mohammad Hamed Dadpour,  David Fern, Ali Yazdani, Bao Lee, Anto Joseph, Nutan Kumar Panda, Rahil Parikh, Julian Schütte, Abhinav Sejpal, Anant Shrivastava, Pragati Singh,  Milan Singh Thakur, Stephanie Vanroelen, Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
Andrew Muller, Jonathan Carter, Stephanie Vanroelen, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230725</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230725"/>
				<updated>2017-06-16T16:05:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Preview Release */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Preview Release  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:Bites.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - OWASP Summit Preview'''&lt;br /&gt;
The Summit Preview contains sample chapters on Android security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== New Release: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Co-Authors:'''&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Jin Kung Ong&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Michael Helwig&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
* Claudio André&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Dharshin De Silva&lt;br /&gt;
* Oguzhan Topgul&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Anuruddha (L3Osi13nT)&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:''' Anant Shrivastava&lt;br /&gt;
&lt;br /&gt;
This list includes everyone who committed 50+ lines of content. The full list of contributors is [https://github.com/OWASP/owasp-mstg/graphs/contributors available on GitHub].&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bites.jpg&amp;diff=230724</id>
		<title>File:Bites.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bites.jpg&amp;diff=230724"/>
				<updated>2017-06-16T16:04:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230723</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230723"/>
				<updated>2017-06-16T16:01:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: Add summit preview&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Preview Release  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://leanpub.com/mobile-security-testing-guide-preview]]&lt;br /&gt;
   | '''Mobile Security Testing Guide - OWASP Summit Preview'''&lt;br /&gt;
The Summit Preview contains sample chapters on Android security testing and reverse engineering. Feel free to download it for $0 or contribute any amount you like. All funds raised through sales of this book go directly into the project budget and will be used to fund production of the final release.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== New Release: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Co-Authors:'''&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Jin Kung Ong&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Michael Helwig&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
* Claudio André&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Dharshin De Silva&lt;br /&gt;
* Oguzhan Topgul&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Anuruddha (L3Osi13nT)&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:''' Anant Shrivastava&lt;br /&gt;
&lt;br /&gt;
This list includes everyone who committed 50+ lines of content. The full list of contributors is [https://github.com/OWASP/owasp-mstg/graphs/contributors available on GitHub].&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230709</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230709"/>
				<updated>2017-06-16T11:49:44Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* New Release: The OWASP Mobile Security Testing Guide - Summit Preview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== New Release: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/owasp-mstg-summit-edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Co-Authors:'''&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Jin Kung Ong&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Michael Helwig&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
* Claudio André&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Dharshin De Silva&lt;br /&gt;
* Oguzhan Topgul&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Anuruddha (L3Osi13nT)&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:''' Anant Shrivastava&lt;br /&gt;
&lt;br /&gt;
This list includes everyone who committed 50+ lines of content. The full list of contributors is [https://github.com/OWASP/owasp-mstg/graphs/contributors available on GitHub].&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230708</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230708"/>
				<updated>2017-06-16T11:43:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== New Release: The OWASP Mobile Security Testing Guide - Summit Preview ==&lt;br /&gt;
  &lt;br /&gt;
The MSTG Summit Preview is an experimental proof-of-concept book created on the OWASP Summit 2017 in London. The goal was to improve the authoring process and book deployment pipeline, as well as to demonstrate the viability of the project. Note that the content is not final and will likely change significantly in subsequent releases.&lt;br /&gt;
&lt;br /&gt;
Download the ebook [https://github.com/OWASP/owasp-mstg/releases/download/1.0/OWASP-Mobile-Testing-Guide-Summit-Edition.epub here].&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Co-Authors:'''&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Jin Kung Ong&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Michael Helwig&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
* Claudio André&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Dharshin De Silva&lt;br /&gt;
* Oguzhan Topgul&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Anuruddha (L3Osi13nT)&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:''' Anant Shrivastava&lt;br /&gt;
&lt;br /&gt;
This list includes everyone who committed 50+ lines of content. The full list of contributors is [https://github.com/OWASP/owasp-mstg/graphs/contributors available on GitHub].&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230139</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230139"/>
				<updated>2017-05-31T03:31:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Co-Authors:'''&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Jin Kung Ong&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Michael Helwig&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
* Claudio André&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Dharshin De Silva&lt;br /&gt;
* Oguzhan Topgul&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Anuruddha (L3Osi13nT)&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:''' Anant Shrivastava&lt;br /&gt;
&lt;br /&gt;
This list includes everyone who committed 50+ lines of content. The full list of contributors is [https://github.com/OWASP/owasp-mstg/graphs/contributors available on GitHub].&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230138</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230138"/>
				<updated>2017-05-31T03:28:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Where do you guys need help the most? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Co-Authors:'''&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Henry Hoggard&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Slawomir Kosowski&lt;br /&gt;
'''Contributors*:'''&lt;br /&gt;
* Andreas Happe&lt;br /&gt;
* Wen Bin Kong&lt;br /&gt;
* Jin Kung Ong&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Michael Helwig&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
* Claudio André&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Dharshin De Silva&lt;br /&gt;
* Oguzhan Topgul&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Anuruddha (L3Osi13nT)&lt;br /&gt;
'''Reviewers:''' Anant Shrivastava&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230071</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230071"/>
				<updated>2017-05-29T03:21:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: lol&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
The OWASP MSTG team is organizing a 5-days mobile security track on the OWASP Summit 2017. The track consists of a series of book sprints, each of which focuses on producing content for a specific section in the OWASP MSTG, as well as proof-reading and editing the existing content. The goal is to make as much progress on the guide as is humanly possible. Depending on the number of participants, we’ll split into sub-groups to work on different subsections or topic areas.&lt;br /&gt;
&lt;br /&gt;
=== How to Join ===&lt;br /&gt;
&lt;br /&gt;
Join up for the working session(s) you like by following the link(s) on the [http://owaspsummit.org/Working-Sessions/Mobile-Security/ mobile security track page], then hitting the &amp;quot;Edit this page here&amp;quot; link at the bottom, and adding yourself to the &amp;quot;participants&amp;quot; field. Signing up is not mandatory, but helps us to better organize the sessions. Don’t worry though if your session of choice happens on the &amp;quot;wrong&amp;quot; day - you can always simply stop by and we’ll brief you on your topic of choice. After all, this is the Woodstock of appsec!&lt;br /&gt;
&lt;br /&gt;
Mobile security track main page:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/Working-Sessions/Mobile-Security/&lt;br /&gt;
&lt;br /&gt;
Mobile security track schedule:&lt;br /&gt;
&lt;br /&gt;
http://owaspsummit.org/schedule/tracks/Mobile-Security.html/&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230070</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=230070"/>
				<updated>2017-05-29T02:57:14Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* Main Deliverables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Security testing in the mobile app development lifecycle&lt;br /&gt;
# Basic static and dynamic security testing&lt;br /&gt;
# Mobile app reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
During the last few months the [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] has made a lot of progress. As we want to push things forward in order to have a first draft of the guide) at the end of Q2, we will be holding a five days working session during the [http://owaspsummit.org OWASP Summit 2017 in London]. Our ambitious goal is to complete the mobile security testing guide. To achieve this, we’ll need to at least close the 126 “missing content” tickets listed on the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] and produce an estimated 200 book-sized pages of content. This sounds like a lot - however, if we can gather 10 people for this working session, this amounts to 4 pages of content per person/day which is achievable.&lt;br /&gt;
&lt;br /&gt;
The main tasks of the five days workshop are:&lt;br /&gt;
&lt;br /&gt;
- Write original content, such as describing testing processes and writing test cases.&lt;br /&gt;
- Proofreading and technical editing to improve the overall quality of the MSTG.&lt;br /&gt;
&lt;br /&gt;
Work will be split between working groups based on mobile OS and topic. On top of completing the content, we want to apply a basic level of proof-reading, review and editing to get the guide beta-ready.&lt;br /&gt;
&lt;br /&gt;
In order to be able to schedule work during the summit and create work groups we need to know who will be attending the OWASP Summit and how much time you can/will spend for the mobile workshop. Please [https://github.com/OWASP/owasp-summit-2017/blob/master/Working-Sessions/Mobile-Security/MSTG.md add yourself to the list of participants] and reach out directly to Sven via Slack.&lt;br /&gt;
&lt;br /&gt;
If you do not have time during the summit but are interested to help, you can start immediately by assigning issues to yourself and creating pull requests. We can also loop you in remotely during the submit.&lt;br /&gt;
&lt;br /&gt;
Let’s work on the testing guide and fix mobile application security!&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Sprint_2017&amp;diff=230058</id>
		<title>OWASP Code Sprint 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Sprint_2017&amp;diff=230058"/>
				<updated>2017-05-27T04:27:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: Remove OWASP Mobile Project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''Goal''' ==&lt;br /&gt;
The OWASP Code Sprint 2017 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Code Sprint 2017 a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== '''Program details''' ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 8 weeks of full-time coding engagement .&lt;br /&gt;
&lt;br /&gt;
== '''How it works''' ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Code Sprint. Each project will be guided by an OWASP mentor. Students are evaluated in the middle and at the end of the coding period, based on success criteria identified at the beginning of the project. Successful students will receive $750 after each evaluation, a total of $1500 per student.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== '''How you can participate''' ==&lt;br /&gt;
&lt;br /&gt;
=== As a student: ===&lt;br /&gt;
&lt;br /&gt;
1. Review the list of OWASP Projects currently participating in the OWASP Code Sprint 2017.&lt;br /&gt;
&lt;br /&gt;
2. Get in touch with the OWASP Project mentor of your choice.&lt;br /&gt;
&lt;br /&gt;
3. Agree deliverables with OWASP mentor. &lt;br /&gt;
&lt;br /&gt;
4. Work away during May thru September&lt;br /&gt;
&lt;br /&gt;
5. Rise to Open Source Development Glory :-)&lt;br /&gt;
&lt;br /&gt;
=== [https://docs.google.com/forms/d/e/1FAIpQLSdAyBg5x9gapfLTL4Q_so7faNpR2QZmtuL3q4la2g5NZnhvyA/viewform ALL STUDENTS PLEASE APPLY HERE] ===&lt;br /&gt;
&lt;br /&gt;
Student application submission is now open: [https://goo.gl/forms/it8hieQAcvCTuPG83 APPLY HERE].&lt;br /&gt;
&lt;br /&gt;
=== As an OWASP Project Leader: ===&lt;br /&gt;
&lt;br /&gt;
1. Edit this page adding your project and some proposed tasks as per the examples&lt;br /&gt;
&lt;br /&gt;
2. Promote the initiative to your academic contacts&lt;br /&gt;
&lt;br /&gt;
== '''Timeplan''' ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== '''Evaluations''' ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
== '''Deadlines''' == &lt;br /&gt;
Program announcement: May 15''', 2017''' &lt;br /&gt;
&lt;br /&gt;
Deadline for Student Applications: '''June 15, 2015''' &lt;br /&gt;
&lt;br /&gt;
Proposal Evaluations: from: '''June''' '''15 thru June 23  2017''' &lt;br /&gt;
&lt;br /&gt;
Successful proposals announcement:: '''June 26, 2017''' &lt;br /&gt;
&lt;br /&gt;
Bonding Period Announcement: June 26, 2017 - July 1, 2017 &lt;br /&gt;
&lt;br /&gt;
Coding Period Starts: '''July 3, 2017''' &lt;br /&gt;
&lt;br /&gt;
Mid-term evaluations: Submitted from :'''July 31, 2017  thru  August 4, 2017'''&lt;br /&gt;
&lt;br /&gt;
Coding Period Re-starts: August 7, 2017&lt;br /&gt;
&lt;br /&gt;
Coding period ends: '''September 1, 2017''' &lt;br /&gt;
&lt;br /&gt;
Final evaluations:'''September 4, 2017 thru September 8, 2017''' &lt;br /&gt;
&lt;br /&gt;
== '''Mailing List''' ==&lt;br /&gt;
Please subscribe to the following mailing list to receive updates or ask any particular questions:&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/forum/?hl=en#!forum/owasp-code-sprint-2017 OWASP Code Sprint  2017 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== '''Project Ideas''' ==&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT  ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* ability to intercept the transactions&lt;br /&gt;
* modify or replay transaction on the fly&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
* Create a browser instance and do the necessary login procedure&lt;br /&gt;
* Handle the browser for the URI&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]] The OWASP Hackademic Challenges project helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment.&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Course Type Challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
We have a sandbox engine which allows for complex guided challenges to be implemented.&lt;br /&gt;
We'd like to build a challenge that guides the user through a series of steps to an end goal and teaches more information on the subject matter on the way.&lt;br /&gt;
This is a very open-ended project on purpose to allow creative student to come up with nice ideas.&lt;br /&gt;
Bellow you will find some examples that we thought might be interesting.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* Purposefully vulnerable web page that guides the user via javascript tooltips and hints to exploiting it using ZAP. ( Bonus: using ZAP via the ZAP api). The challenge is solved when the the student submits the contents of a text file located on the disk (obtained by exploited an RCE)&lt;br /&gt;
&lt;br /&gt;
* Reversing a provided binary to extract information by providing step by step instructions to reversing using any popular reversing tool (well, you can't use IDA so gdb should have to do). Challenge is solved when the keys are extracted from the binary and submitted. Bonus points if each binary donwloaded has different keys.&lt;br /&gt;
&lt;br /&gt;
* Guide to exploiting the TOP10. (Using ZAP?)&lt;br /&gt;
&lt;br /&gt;
* Defensive Type challenges -- Here's how to create a patch for this kind of vulnerability -- Challenge is solved when the unit tests are run and the vulnerability isn't there.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Check popular javascript guide tools such as: (http://introjs.com/ and http://github.hubspot.com/shepherd/docs/welcome/ )&lt;br /&gt;
* If you're more interested in system or non-web challenges check serverspec and definitely check quest (https://github.com/puppetlabs/quest)&lt;br /&gt;
* If you think contributing is a good idea to make yourself familiar with the project you can either port one of the existing simpler 1-page challenges to a docker container and submit a pull request or write a guide on how to create such a challenge&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* One or more Course - style challenges provided either as a docker container or as a vagrant box.&lt;br /&gt;
* Concrete documentation on how to build a challenge like this.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
The technologies used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=229610</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=229610"/>
				<updated>2017-05-14T05:58:48Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: Fix link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
During the last few months the [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] has made a lot of progress. As we want to push things forward in order to have a first draft of the guide) at the end of Q2, we will be holding a five days working session during the [http://owaspsummit.org OWASP Summit 2017 in London]. Our ambitious goal is to complete the mobile security testing guide. To achieve this, we’ll need to at least close the 126 “missing content” tickets listed on the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] and produce an estimated 200 book-sized pages of content. This sounds like a lot - however, if we can gather 10 people for this working session, this amounts to 4 pages of content per person/day which is achievable.&lt;br /&gt;
&lt;br /&gt;
The main tasks of the five days workshop are:&lt;br /&gt;
&lt;br /&gt;
- Write original content, such as describing testing processes and writing test cases.&lt;br /&gt;
- Proofreading and technical editing to improve the overall quality of the MSTG.&lt;br /&gt;
&lt;br /&gt;
Work will be split between working groups based on mobile OS and topic. On top of completing the content, we want to apply a basic level of proof-reading, review and editing to get the guide beta-ready.&lt;br /&gt;
&lt;br /&gt;
In order to be able to schedule work during the summit and create work groups we need to know who will be attending the OWASP Summit and how much time you can/will spend for the mobile workshop. Please [https://github.com/OWASP/owasp-summit-2017/blob/master/Working-Sessions/Mobile-Security/MSTG.md add yourself to the list of participants] and reach out directly to Sven via Slack.&lt;br /&gt;
&lt;br /&gt;
If you do not have time during the summit but are interested to help, you can start immediately by assigning issues to yourself and creating pull requests. We can also loop you in remotely during the submit.&lt;br /&gt;
&lt;br /&gt;
Let’s work on the testing guide and fix mobile application security!&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=229609</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=229609"/>
				<updated>2017-05-14T05:58:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== Mobile Security Testing Workshop on the OWASP Summit 2017  ==&lt;br /&gt;
  &lt;br /&gt;
During the last few months the [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] has made a lot of progress. As we want to push things forward in order to have a first draft of the guide) at the end of Q2, we will be holding a five days working session during the [http://owaspsummit.org OWASP Summit 2017 in London]. Our ambitious goal is to complete the mobile security testing guide. To achieve this, we’ll need to at least close the 126 “missing content” tickets listed on the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] and produce an estimated 200 book-sized pages of content. This sounds like a lot - however, if we can gather 10 people for this working session, this amounts to 4 pages of content per person/day which is achievable.&lt;br /&gt;
&lt;br /&gt;
The main tasks of the five days workshop are:&lt;br /&gt;
&lt;br /&gt;
- Write original content, such as describing testing processes and writing test cases.&lt;br /&gt;
- Proofreading and technical editing to improve the overall quality of the MSTG.&lt;br /&gt;
&lt;br /&gt;
Work will be split between working groups based on mobile OS and topic. On top of completing the content, we want to apply a basic level of proof-reading, review and editing to get the guide beta-ready.&lt;br /&gt;
&lt;br /&gt;
In order to be able to schedule work during the summit and create work groups we need to know who will be attending the OWASP Summit and how much time you can/will spend for the mobile workshop. Please [add yourself to the list of participants https://github.com/OWASP/owasp-summit-2017/blob/master/Working-Sessions/Mobile-Security/MSTG.md] and reach out directly to Sven via Slack.&lt;br /&gt;
&lt;br /&gt;
If you do not have time during the summit but are interested to help, you can start immediately by assigning issues to yourself and creating pull requests. We can also loop you in remotely during the submit.&lt;br /&gt;
&lt;br /&gt;
Let’s work on the testing guide and fix mobile application security!&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_01/ Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/Crackmes/iOS/Level_02/ Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=229123</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=229123"/>
				<updated>2017-04-25T04:40:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* How can I participate in your project? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level1 Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level2 Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
&lt;br /&gt;
'''We are searching for additional authors, reviewers and editors.''' The best way to get started is to browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content]. Also, check the [https://github.com/OWASP/owasp-mstg/projects/1 project dashboard] for a list of open tasks.&lt;br /&gt;
&lt;br /&gt;
Drop a us line on the [https://owasp.slack.com/messages/project-mobile_omtg/details/) Slack channel] before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:&lt;br /&gt;
&lt;br /&gt;
http://owasp.herokuapp.com/&lt;br /&gt;
&lt;br /&gt;
Before you start contributing, please read our brief [https://github.com/OWASP/owasp-mstg/blob/master/style_guide.md style guide] which contains a few basic writing rules.&lt;br /&gt;
&lt;br /&gt;
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue [https://github.com/OWASP/owasp-mstg/issues issue] or ping us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228347</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228347"/>
				<updated>2017-04-05T08:40:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
[https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf Version 0.9.3] of the MASVS is now [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level1 Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level2 Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
First of all, check the [https://github.com/OWASP/owasp-mstg/blob/master/README.md README], browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content], and decide where you would like to contribute.&lt;br /&gt;
Then, ping the contact responsible for the chapter you are interested in. You can find their name and GitHub handle in the project [https://github.com/OWASP/owasp-mstg/blob/master/README.md README]. Please always check with the responsible person first, or you might end up working on a chapter that's already being done by someone else. &lt;br /&gt;
In any case, we encourage you to join [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mobile Security Testing Guide is on [https://github.com/OWASP/owasp-mstg GitHub.] The MASVS is hosted in a [https://github.com/OWASP/owasp-masvs separate repository].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228346</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228346"/>
				<updated>2017-04-05T08:39:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf version 0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
Version 0.9.3 of the MASVS is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level1 Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level2 Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
First of all, check the [https://github.com/OWASP/owasp-mstg/blob/master/README.md README], browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content], and decide where you would like to contribute.&lt;br /&gt;
Then, ping the contact responsible for the chapter you are interested in. You can find their name and GitHub handle in the project [https://github.com/OWASP/owasp-mstg/blob/master/README.md README]. Please always check with the responsible person first, or you might end up working on a chapter that's already being done by someone else. &lt;br /&gt;
In any case, we encourage you to join [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mobile Security Testing Guide is on [https://github.com/OWASP/owasp-mstg GitHub.] The MASVS is hosted in a [https://github.com/OWASP/owasp-masvs separate repository].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228345</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228345"/>
				<updated>2017-04-05T08:37:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/f/fe/MASVS_v0.9.3.pdf].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
Version 0.9.3 of the MASVS is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level1 Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level2 Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
First of all, check the [https://github.com/OWASP/owasp-mstg/blob/master/README.md README], browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content], and decide where you would like to contribute.&lt;br /&gt;
Then, ping the contact responsible for the chapter you are interested in. You can find their name and GitHub handle in the project [https://github.com/OWASP/owasp-mstg/blob/master/README.md README]. Please always check with the responsible person first, or you might end up working on a chapter that's already being done by someone else. &lt;br /&gt;
In any case, we encourage you to join [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mobile Security Testing Guide is on [https://github.com/OWASP/owasp-mstg GitHub.] The MASVS is hosted in a [https://github.com/OWASP/owasp-masvs separate repository].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASVS_v0.9.3.pdf&amp;diff=228344</id>
		<title>File:MASVS v0.9.3.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASVS_v0.9.3.pdf&amp;diff=228344"/>
				<updated>2017-04-05T08:36:44Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: MASVS v0.9.3 with fixed footer...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MASVS v0.9.3 with fixed footer...&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228343</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228343"/>
				<updated>2017-04-05T08:34:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/8/8e/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/8/8e/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf MASVS v0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
Version 0.9.3 of the MASVS is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level1 Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level2 Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
First of all, check the [https://github.com/OWASP/owasp-mstg/blob/master/README.md README], browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content], and decide where you would like to contribute.&lt;br /&gt;
Then, ping the contact responsible for the chapter you are interested in. You can find their name and GitHub handle in the project [https://github.com/OWASP/owasp-mstg/blob/master/README.md README]. Please always check with the responsible person first, or you might end up working on a chapter that's already being done by someone else. &lt;br /&gt;
In any case, we encourage you to join [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mobile Security Testing Guide is on [https://github.com/OWASP/owasp-mstg GitHub.] The MASVS is hosted in a [https://github.com/OWASP/owasp-masvs separate repository].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228342</id>
		<title>OWASP Mobile Security Testing Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Testing_Guide&amp;diff=228342"/>
				<updated>2017-04-05T08:33:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bernhard Mueller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_MSTG_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Our Vision ==&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;quot;Define the industry standard for mobile application security.&amp;quot;''' ===&lt;br /&gt;
&lt;br /&gt;
We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&lt;br /&gt;
&lt;br /&gt;
== Main Deliverables  ==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
  |-&lt;br /&gt;
   | [[File:mstg-mini-2.jpg|link=https://www.github.com/OWASP/owasp-mstg/]]&lt;br /&gt;
   | '''Mobile Security Testing Guide'''&lt;br /&gt;
A comprehensive guide for iOS and Android mobile security testers with the following content:&lt;br /&gt;
# Mobile platform internals&lt;br /&gt;
# Testing in the secure development lifecycle&lt;br /&gt;
# Basic white-box and black-box security testing&lt;br /&gt;
# Mobile reverse engineering and tampering&lt;br /&gt;
# Assessing software protections&lt;br /&gt;
# Detailed white-box and black-box test cases that map to the requirements in the MASVS.&lt;br /&gt;
The MSTG is a work-in-progress. Currently, we hope to be &amp;quot;feature-complete&amp;quot; in Q3 2017. You can contribute and comment in the [https://github.com/OWASP/owasp-mstg GitHub Repo]. A book version of the current master branch is available on [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ Gitbook].&lt;br /&gt;
 |-&lt;br /&gt;
   | [[File:masvs-sample-mini.jpg|link=https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf]]&lt;br /&gt;
  |  '''Mobile App Security Requirements and Verification'''&lt;br /&gt;
The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf OWASP Mobile Application Security Verification Standard (MASVS)] is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is [https://www.owasp.org/images/8/8e/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf MASVS v0.9.3].&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:checklist.jpg|link=https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx]]&lt;br /&gt;
   | '''Mobile App Security Checklist'''&lt;br /&gt;
A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is [https://www.owasp.org/images/1/1b/Mobile_App_Security_Checklist_0.9.3.xlsx version 0.9.3].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Bernhard_Mueller Bernhard Mueller]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Sven_Schleier Sven Schleier]&lt;br /&gt;
&lt;br /&gt;
== Road Map ==&lt;br /&gt;
&lt;br /&gt;
* Q3 2017: Beta release&lt;br /&gt;
* Q4 2017: Version 1.0&lt;br /&gt;
* Q1 2018: Produce A Printable Book&lt;br /&gt;
&lt;br /&gt;
== Parent Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Mobile_Security_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How-To=&lt;br /&gt;
&lt;br /&gt;
== Using the OWASP Mobile App Security Verification Standard, Testing Guide and Checklist ==&lt;br /&gt;
&lt;br /&gt;
The documents produced in this project cover many aspects of mobile application security, from the high-level requirements to the nitty-gritty implementation details and test cases. They can be used to plan and verify security controls during any phase of mobile app development, as well as during pre-release code review and penetration testing.&lt;br /&gt;
&lt;br /&gt;
# The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf Mobile Application Security Verification Standard (MASVS)] contains generic security requirements along with mappings to verification levels that can be chosen depending on the overall need for security.&lt;br /&gt;
# The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide (MSTG)] provides verification instructions for each requirement in the MASVS, as well as security best practices for apps on each supported mobile operating system (currently Android and iOS). It is also useful as a standalone learning resource and reference guide for mobile application security testers.&lt;br /&gt;
# The [https://www.owasp.org/images/6/6f/Mobile_App_Security_Checklist_0.9.2.xlsx Mobile App Security Checklist] can be used to apply the MASVS requirements during practical assessments. It also conveniently links to the MSTG test case for each requirement, making mobile penetration testing a breeze.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the security standard, testing guide and checklists are closely related: They all map to the same basic set of requirements. Depending on the context, the documents can be used stand-alone or in combination to achieve different objectives.&lt;br /&gt;
&lt;br /&gt;
[[File:Overview-800px.jpg]]&lt;br /&gt;
&lt;br /&gt;
For example, the MASVS requirements may be used in the planning and architecture design stages, while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Testing ==&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/images/9/94/Mobile_App_Security_Verification_Checklist_0.8.2.xlsx checklist] works great as a reference during mobile app security assessments. You can walk through the requirements one-by-one - for more information on each requirement, simply click on the link in the &amp;quot;Testing procedures&amp;quot; column. Or, fill out the checklist at the end of an assessment to ensure completeness. &lt;br /&gt;
&lt;br /&gt;
== Security Engineering in the SDLC ==&lt;br /&gt;
&lt;br /&gt;
Properly defined security requirements are an important part of the Secure SDLC. The [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf MASVS] levels can be used along with threat modeling to determine the appropriate set of security controls for a particular mobile app. MASVS V1 also lists requirements pertaining to the architecture and design of the mobile apps, as well as general processes and activities that should be part of the development process.&lt;br /&gt;
&lt;br /&gt;
== Mobile App Security Education ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/OWASP/owasp-mstg Mobile Security Testing Guide] can be used as a standalone learning resource. Its main chapters contain general how-tos and tutorials that cover a variety of topics from mobile OS internals to advanced reverse engineering techniques.&lt;br /&gt;
&lt;br /&gt;
=News=&lt;br /&gt;
&lt;br /&gt;
== April 5th, 2017: Mobile App Security Verification Standard Update ==&lt;br /&gt;
  &lt;br /&gt;
Version 0.9.3 of the MASVS is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.3.pdf available for download] . This release contains several bug fixes and modifications to security requirements:&lt;br /&gt;
&lt;br /&gt;
 * Merged requirements 7.8 and 7.9 into for simplification&lt;br /&gt;
 * Removed Anti-RE controls 8.1 and 8.2&lt;br /&gt;
 * Updated MSTG links to current master&lt;br /&gt;
 * Section &amp;quot;Environmental Interaction&amp;quot; renamed to &amp;quot;Platform Interaction&amp;quot;&lt;br /&gt;
 * Removed To-dos&lt;br /&gt;
 * Fixed some wording &amp;amp; spelling issues&lt;br /&gt;
&lt;br /&gt;
== January 31st, 2017: Mobile App Security Verification Standard v0.9.2 Available For Download ==&lt;br /&gt;
  &lt;br /&gt;
The Mobile App Security Verification Standard (MASVS) has undergone a major revision, including a re-design of the security model and verification levels. We also revised many security requirements to address the multitude of [https://github.com/OWASP/owasp-masvs/issues?q=is%3Aissue%20 issues raised on GitHub]. The result is MASVS v0.9.2, which is now [https://www.owasp.org/images/f/f2/OWASP_Mobile_AppSec_Verification_Standard_v0.9.2.pdf available for download in PDF format].&lt;br /&gt;
&lt;br /&gt;
As the MASVS is nearing maturity, we have decided to freeze the requirements until the Mobile Testing Guide and checklists &amp;quot;catch up&amp;quot; (due to the one-to-one mapping between requirements in the MASVS and MSTG, changes to the requirements make it necessary to update the other documents as well, causing repeated effort). Unless major issues pop up, the current list will therefore remain in place until MASVS/MSTG v1.0, and further changes will be reserved for v1.1 or later releases.&lt;br /&gt;
&lt;br /&gt;
The MASVS is a community effort to establish security requirements for designing, developing and testing secure mobile apps on iOS and Android. Join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] to meet the project members! You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 28th, 2017: Mobile Crackmes and Reversing Tutorials ==&lt;br /&gt;
   {| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | [[File:uncrackable-250.png|link=]]&lt;br /&gt;
  |  &lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we'd like to link most of the content to practical examples. &lt;br /&gt;
&lt;br /&gt;
Starting now, we'll be adding [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md crackmes for Android and iOS] to the [https://github.com/OWASP/owasp-mstg GitHub repo] that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing. For starters there are three challenges:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/01_Android/01_License_Validation Android License Validator]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level1 Uncrackable App for iOS Level 1]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/tree/master/OMTG-Files/02_Crackmes/02_iOS/UnCrackable_Level2 Uncrackable App for iOS Level 2]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of these three already has a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec documented solution] in the guide. Tutorials for solving the other two [https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md still need to be added].&lt;br /&gt;
&lt;br /&gt;
=== We Need More Authors and Contributors! ===&lt;br /&gt;
&lt;br /&gt;
Maybe you have noticed that [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html the reverse engineering sections in the Mobile Testing Guide are incomplete]. The reason: We're still in the starting stages and don't have a lot of authors and contributors (in fact, 99% of the reversing content was produced by one guy). We'd love to welcome *you* as a contributor of crackmes, tutorials, writeups, or simply new ideas for this project. &lt;br /&gt;
 &lt;br /&gt;
==== What You Can Do  ====&lt;br /&gt;
&lt;br /&gt;
The OWASP MSTG is an open project and there's a lot of flexibility - it mostly depends on your skill set and willingness to commit your time. That said, the some areas that need help are:&lt;br /&gt;
&lt;br /&gt;
* Solving crackmes and contributing a tutorial to the guide (preferable a technique that's not already documented. Check the [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html TOC] first).&lt;br /&gt;
* Writing and adding new crackmes along with solutions (should also describe something not already in the guide. Cracking white-boxes, dynamic analysis using an emulator / introspection, etc. etc.).&lt;br /&gt;
* General reversing write-ups to describe specific processes and techniques&lt;br /&gt;
* Help us figure out [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07b-Assessing_Software_Protections.md resiliency testing processes] and [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics]&lt;br /&gt;
&lt;br /&gt;
The reversing part of the guide consists of the following chapters:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Tampering and Reverse Engineering - General Overview]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#tampering-and-reverse-engineering-on-android Tampering and Reverse Engineering on Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios Tampering and Reverse Engineering on iOS]&lt;br /&gt;
&lt;br /&gt;
==== How To Join  ====&lt;br /&gt;
&lt;br /&gt;
Read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first, and join the [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
== January 22nd, 2017: Mobile Testing Guide TOC Available ==&lt;br /&gt;
&lt;br /&gt;
As of now, we'll be auto-generating a [https://rawgit.com/OWASP/owasp-mstg/master/Generated/OWASP-MSTG-Table-of-Contents.html table of contents] out of the current MSTG master branch. This reflects the current state of the guide, and should make it easier to coordinate work between authors. A short-term goal is to finalize the structure of the guide so we get a clearer picture of what will be included in the final document. Lead authors are encouraged to complete the outline of their respective chapters. &lt;br /&gt;
&lt;br /&gt;
'''On another note, we still need additional authors to help with all sections of the guide, including mobile operating system overviews, testing processes and techniques, and reverse engineering.''' Especially iOS authors are in short supply! As usual, ping us on the [https://owasp.slack.com/messages/project-mobile_omtg/details/ Slack Channel] if you want to contribute.&lt;br /&gt;
&lt;br /&gt;
== December 4th, 2016: Call For Authors: The Ultimate Open-Source Mobile App Reverse Engineering Guide ==&lt;br /&gt;
&lt;br /&gt;
Reverse engineering is an art, and describing every available facet of it would fill a whole library. The sheer range techniques and possible specializations is mind-blowing: One can spend years working on a very specific, isolated sub-problem, such as automating malware analysis or developing novel de-obfuscation methods. For mobile app security testers, it can be challenging to filter through the vast amount of information and build a working methodology. Things become even more problematic when one is tasked to assess apps that are heavily obfuscated and have anti-tampering measures built in.&lt;br /&gt;
&lt;br /&gt;
One of the main goals in the MSTG is to build the ultimate resource for mobile reverse engineers. This includes not only basic static and dynamic analysis, but also advanced de-obfuscation, scripting and automation. Obviously, writing all this content is a lot of work, both in terms of general content and OS-specific how-tos. We're therefore looking for talented authors that want to join the project early on. Topics include the following:&lt;br /&gt;
&lt;br /&gt;
* Basic Hybrid Static/Dynamic Analysis&lt;br /&gt;
* Code Injection and Dynamic Instrumentation (Substrate, FRIDA)&lt;br /&gt;
* Dynamic Binary Instrumentation (Valgrind, PIE)&lt;br /&gt;
* Analysis Frameworks (Metasm / Miasm)&lt;br /&gt;
* Symbolic Execution&lt;br /&gt;
* DCA and DPA attacks on white-box crypto&lt;br /&gt;
* Dynamic analysis frameworks (PANDA / DroidScope,...)&lt;br /&gt;
* Anything else we might have missed&lt;br /&gt;
&lt;br /&gt;
=== What is in for me? ===&lt;br /&gt;
&lt;br /&gt;
All of this is unpaid, volunteer work. However, depending on your contribution, you will be named in the &amp;quot;lead authors&amp;quot; or &amp;quot;contributors&amp;quot; list, and you'll be able to point to the fact that you co-authored the guide. You'll also be contributing to the field, helping others who are just starting out, and in turn becoming a happier person yourself (reaping the full benefits of your altruism).&lt;br /&gt;
&lt;br /&gt;
=== Where do I sign up? ===&lt;br /&gt;
&lt;br /&gt;
First of all, have a look at the existing RE chapters outline:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering Generic / Introduction]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md Android]&lt;br /&gt;
* [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md#tampering-and-reverse-engineering-on-ios iOS]&lt;br /&gt;
&lt;br /&gt;
You'll probably immediately have ideas on how you can contribute. If that's the case, read the [https://github.com/OWASP/owasp-mstg/blob/master/authors_guide.md author's guide] first. &lt;br /&gt;
&lt;br /&gt;
Then contact [https://github.com/b-mueller Bernhard Mueller] - ideally directly on the  [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
First of all, check the [https://github.com/OWASP/owasp-mstg/blob/master/README.md README], browse the [https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/ existing content], and decide where you would like to contribute.&lt;br /&gt;
Then, ping the contact responsible for the chapter you are interested in. You can find their name and GitHub handle in the project [https://github.com/OWASP/owasp-mstg/blob/master/README.md README]. Please always check with the responsible person first, or you might end up working on a chapter that's already being done by someone else. &lt;br /&gt;
In any case, we encourage you to join [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel], where you'll find all the other project members. You can sign up for an account [http://owasp.herokuapp.com/ here].&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Mobile Security Testing Guide is on [https://github.com/OWASP/owasp-mstg GitHub.] The MASVS is hosted in a [https://github.com/OWASP/owasp-masvs separate repository].&lt;br /&gt;
&lt;br /&gt;
==Where do you guys need help the most?==&lt;br /&gt;
&lt;br /&gt;
There's a lot of areas where you can help out:&lt;br /&gt;
&lt;br /&gt;
* Writing original content, such as describing testing processes and writing test cases. We're all doing this in our spare time, which unfortunately means that things sometimes slow down to a crawl. If you're knowledgeable in some area and have time available, we'd be incredibly thankful to anyone who contributes, even if it's only one or two test cases.&lt;br /&gt;
&lt;br /&gt;
* Reviewing content and giving feedback. The proper channel for questions and feedback is the GitHub issues system of the respective repo, contacting us on [https://owasp.slack.com/messages/project-mobile_omtg/details/ OWASP Mobile Security Project Slack Channel] is another possibility.&lt;br /&gt;
&lt;br /&gt;
* Developing tools. For example, we still don't have an automated way of generating checklists out of the GitHub repo.&lt;br /&gt;
&lt;br /&gt;
* Contributing to auxiliary projects: The [https://github.com/b-mueller/obfuscation-metrics obfuscation metrics project] is an auxiliary project that deals with specific forms of control flow and data obfuscation. This project needs experts in advanced obfuscation / de-obfuscation. Please contact us if you have experience in this area.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
==I contributed to the original Google Doc, but I'm not credited in the new version of the MSTG? ==&lt;br /&gt;
As we migrated some of the existing content, we did our best to backtrack the original authors and credit them appropriately. We also added a [https://github.com/OWASP/owasp-mstg/blob/master/Document/0x02-Frontispiece.md revision history] that lists all the authors from old Google Docs. If you are not on that list but feel you should be, please contact [https://github.com/b-mueller Bernhard] or [https://github.com/sushi2k Sven] and they'll fix it. Or better yet, re-join the author's team and start contributing to the new guide.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The Mobile Security Testing Guide was initiated by  [https://www.owasp.org/index.php/User:Milan_Singh_Thakur Milan Singh Thakur] in 2015. The original document was hosted on Google Drive. Guide development was moved to GitHub in October 2016. Below is the full list of contributors for each revision.&lt;br /&gt;
&lt;br /&gt;
=== MSTG in its current form ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Bernhard Mueller&lt;br /&gt;
* Sven Schleier&lt;br /&gt;
&lt;br /&gt;
'''Contributors:'''&lt;br /&gt;
&lt;br /&gt;
* Abdessamad Temmar&lt;br /&gt;
* Francesco Stillavato&lt;br /&gt;
* Pawel Rzepa&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
* Daniel Ramirez Martin&lt;br /&gt;
*Jin Kung Ong&lt;br /&gt;
* Alexander Antukh&lt;br /&gt;
* Claudia André&lt;br /&gt;
* Ryan Teoh&lt;br /&gt;
* Prathan Phongthiproek&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Romuald Szkudlarek&lt;br /&gt;
* Luander Ribeiro&lt;br /&gt;
* Pishu Mahtani&lt;br /&gt;
* Sebastian Banescu&lt;br /&gt;
* Prabhant Singh&lt;br /&gt;
*  Stephen Corbiaux&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 2&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:'''&lt;br /&gt;
&lt;br /&gt;
* Mirza Ali&lt;br /&gt;
* Stephen Corbiaux&lt;br /&gt;
* Ryan Dewhurst&lt;br /&gt;
* Mohammad Hamed Dadpour&lt;br /&gt;
* David Fern&lt;br /&gt;
* Ali Yazdani&lt;br /&gt;
* Bao Lee&lt;br /&gt;
* Anto Joseph&lt;br /&gt;
* Nutan Kumar Panda&lt;br /&gt;
* Rahil Parikh&lt;br /&gt;
* Julian Schütte&lt;br /&gt;
* Abhinav Sejpal&lt;br /&gt;
* Anant Shrivastava&lt;br /&gt;
* Pragati Singh&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Gerhard Wagner&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
* Andrew Muller&lt;br /&gt;
* Jonathan Carter&lt;br /&gt;
* Stephanie Vanroelen&lt;br /&gt;
* Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
=== MSTG &amp;quot;Beta 1&amp;quot; on Google Drive ===&lt;br /&gt;
&lt;br /&gt;
'''Authors:''' &lt;br /&gt;
&lt;br /&gt;
*Mirza Ali &lt;br /&gt;
*Mohammad Hamed Dadpour&lt;br /&gt;
*David Fern&lt;br /&gt;
*Rahil Parikh&lt;br /&gt;
*Abhinav Sejpal&lt;br /&gt;
*Pragati Singh&lt;br /&gt;
*Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
'''Reviewers:'''&lt;br /&gt;
&lt;br /&gt;
*Andrew Muller&lt;br /&gt;
*Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
'''Top Contributors:'''&lt;br /&gt;
&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Yair Amit&lt;br /&gt;
*Amin Lalji&lt;br /&gt;
*OWASP Mobile Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Bernhard Mueller</name></author>	</entry>

	</feed>