<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dominic+Chell</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dominic+Chell"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Dominic_Chell"/>
		<updated>2026-04-12T23:30:03Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Manchester&amp;diff=188342</id>
		<title>Manchester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Manchester&amp;diff=188342"/>
				<updated>2015-01-21T14:50:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dominic Chell: /* Chapter Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Manchester|extra=&lt;br /&gt;
&lt;br /&gt;
This [[UK]] chapter was started in 2011, having grown out of the successful [[Leeds_UK]] chapter. &lt;br /&gt;
&lt;br /&gt;
Follow [https://twitter.com/OwaspMcr @OwaspMcr] on Twitter.&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Manchester|emailarchives=http://lists.owasp.org/pipermail/owasp-Manchester}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Tuesday 17th February 2015&lt;br /&gt;
&lt;br /&gt;
'''Location:''' [http://www.kpmg.com/UK/en/about/mapofofficesandlinks/Manchester/Pages/default.aspx KPMG]&lt;br /&gt;
&lt;br /&gt;
Please note that this is a NEW location for the KPMG offices, opposite the library - dont go to the old one!&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' [https://www.eventbrite.co.uk/e/owasp-manchester-chapter-17th-february-2015-tickets-15434339525 Eventbrite] (mandatory)&lt;br /&gt;
&lt;br /&gt;
This event is kindly hosted by [http://www.kpmg.com/ KPMG], with sponsorship for refreshments from [https://www.mdsec.co.uk/ MDSec].&lt;br /&gt;
&lt;br /&gt;
Doors will be open from 18:00, with talks kicking off at 18:30. Please be prompt, as access to the building may be limited after 18:30, and you may miss out on the refreshments!&lt;br /&gt;
&lt;br /&gt;
'''18:00 Registration'''&lt;br /&gt;
&lt;br /&gt;
'''18:25 Introduction'''&lt;br /&gt;
&lt;br /&gt;
'''18:30 Talk: PRSSI Quirks - James Kettle'''&lt;br /&gt;
&lt;br /&gt;
James Kettle is a web security researcher on the Burp Suite team. He will be talking about a prevalent but little-understood web vulnerability, with a real example of a recent 0day in a popular web platform.&lt;br /&gt;
&lt;br /&gt;
'''19:15 Talk: OWASP ZAP 2.4.0 - Simon Bennetts'''&lt;br /&gt;
&lt;br /&gt;
ZAP is an OWASP Flagship project and the most active open source web application scanner. Simon is the OWASP ZAP project lead and works for Mozilla as part of their security team. In this talk Simon will give an overview of the new features available in the forthcoming 2.4.0 release.&lt;br /&gt;
&lt;br /&gt;
'''20:00 Talk: Burp Collaborator - Dafydd Stuttard'''&lt;br /&gt;
&lt;br /&gt;
Dafydd Stuttard is the creator of Burp Suite and author of The Web Application Hacker's Handbook. He will be talking about a new technique for web testing that will soon be available in Burp Suite, and which will enable the automated and manual discovery of many types of vulnerability that currently elude all but the best penetration testers.&lt;br /&gt;
&lt;br /&gt;
'''20:45 Networking'''&lt;br /&gt;
&lt;br /&gt;
This will probably be the only chance this year to hear about both the new features in Burp and ZAP from the respective project leaders, so we expect this event to be very popular - book now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
We plan to hold quarterly events but the precise dates have not been agreed yet.&lt;br /&gt;
&lt;br /&gt;
Please get in touch if you would like to speak at a Manchester event, or can help out in providing facilities, locations, talks or a donation to the cause - we would be delighted to hear from you.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2014 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2014_09_08_Manchester|8th September]]&lt;br /&gt;
&lt;br /&gt;
[[2014_05_13_Manchester|13th May]]&lt;br /&gt;
&lt;br /&gt;
[[2014_02_27_Manchester|27th February]]&lt;br /&gt;
&lt;br /&gt;
'''2013 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2013_04_30_Manchester|30th April]]&lt;br /&gt;
&lt;br /&gt;
'''2012 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2012_09_11_Manchester|11th September]]&lt;br /&gt;
&lt;br /&gt;
[[2012_05_30_Manchester|30th May]]&lt;br /&gt;
&lt;br /&gt;
[[2012_02_01_Manchester|1st February]]&lt;br /&gt;
&lt;br /&gt;
'''2011 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2011_11_16_Manchester|16th November]]&lt;br /&gt;
&lt;br /&gt;
[[2011_08_24_Manchester|24th August]] As part of the Leeds Chapter&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Leeds_UK 22nd June]  As part of the Leeds Chapter&lt;br /&gt;
&lt;br /&gt;
'''2010 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[8th_December_Leeds|8th December]]  As part of the Leeds Chapter&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
* [[User:Simon Ward|Simon Ward]]&lt;br /&gt;
* [[User:Andy_Hornsby-Jones|Andy Hornsby-Jones]]&lt;br /&gt;
* [[User:Dominic_Chell|Dominic Chell]]&lt;br /&gt;
&lt;br /&gt;
We are actively seeking more chapter leaders - please get in touch if you would like to become one!&lt;br /&gt;
&lt;br /&gt;
= Sponsorship  =&lt;br /&gt;
&lt;br /&gt;
We are looking for organizations to sponsor the Manchester chapter.&lt;br /&gt;
&lt;br /&gt;
You can sponsor the chapter for one year at the following levels:&lt;br /&gt;
* £300 Silver&lt;br /&gt;
* £600 Gold&lt;br /&gt;
* £1200 Platinum&lt;br /&gt;
&lt;br /&gt;
You can also sponsor a meeting by hosting the event or donating £100.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring the chapter then please get in touch with one of the chapter leaders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Local Organizations  =&lt;br /&gt;
&lt;br /&gt;
Other related organizations in the Manchester area:&lt;br /&gt;
&lt;br /&gt;
* [http://manchester.bcs.org/ BCS Manchester]&lt;br /&gt;
* [http://geekup.org/ GeekUp]&lt;br /&gt;
* [http://madlab.org.uk/ MadLab]&lt;br /&gt;
* [http://libreplanet.org/wiki/Manchester Manchester Free Software]&lt;br /&gt;
* [http://www.manlug.org/ Manchester Linux Users Group]&lt;br /&gt;
* [http://nuksg.org/ Northern UK Security Group]&lt;br /&gt;
* [http://nwdc.org.uk/ North West Digital Communities (NWDC)]&lt;br /&gt;
* [http://www.meetup.com/North-West-Tester-Gathering North West Tester Gathering]&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organization listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-Manchester Manchester mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Dominic Chell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Manchester&amp;diff=188341</id>
		<title>Manchester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Manchester&amp;diff=188341"/>
				<updated>2015-01-21T14:41:55Z</updated>
		
		<summary type="html">&lt;p&gt;Dominic Chell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Manchester|extra=&lt;br /&gt;
&lt;br /&gt;
This [[UK]] chapter was started in 2011, having grown out of the successful [[Leeds_UK]] chapter. &lt;br /&gt;
&lt;br /&gt;
Follow [https://twitter.com/OwaspMcr @OwaspMcr] on Twitter.&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Manchester|emailarchives=http://lists.owasp.org/pipermail/owasp-Manchester}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Tuesday 17th February 2015&lt;br /&gt;
&lt;br /&gt;
'''Location:''' [http://www.kpmg.com/UK/en/about/mapofofficesandlinks/Manchester/Pages/default.aspx KPMG]&lt;br /&gt;
&lt;br /&gt;
Please note that this is a NEW location for the KPMG offices, opposite the library - dont go to the old one!&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' [https://www.eventbrite.co.uk/e/owasp-manchester-chapter-17th-february-2015-tickets-15434339525 Eventbrite] (mandatory)&lt;br /&gt;
&lt;br /&gt;
This event is kindly hosted by [http://www.kpmg.com/ KPMG], with sponsorship for refreshments from [https://www.mdsec.co.uk/ MDSec].&lt;br /&gt;
&lt;br /&gt;
Doors will be open from 18:00, with talks kicking off at 18:30. Please be prompt, as access to the building may be limited after 18:30, and you may miss out on the refreshments!&lt;br /&gt;
&lt;br /&gt;
'''18:00 Registration'''&lt;br /&gt;
&lt;br /&gt;
'''18:25 Introduction'''&lt;br /&gt;
&lt;br /&gt;
'''18:30 Talk: PRSSI Quirks - James Kettle'''&lt;br /&gt;
&lt;br /&gt;
James Kettle is a web security researcher on the Burp Suite team. He will be talking about a prevalent but little-understood web vulnerability, with a real example of a recent 0day in a popular web platform.&lt;br /&gt;
&lt;br /&gt;
'''19:15 Talk: OWASP ZAP 2.4.0 - Simon Bennetts'''&lt;br /&gt;
&lt;br /&gt;
ZAP is an OWASP Flagship project and the most active open source web application scanner. Simon is the OWASP ZAP project lead and works for Mozilla as part of their security team. In this talk Simon will give an overview of the new features available in the forthcoming 2.4.0 release.&lt;br /&gt;
&lt;br /&gt;
'''20:00 Talk: Burp Collaborator - Dafydd Stuttard'''&lt;br /&gt;
&lt;br /&gt;
Dafydd Stuttard is the creator of Burp Suite and author of The Web Application Hacker's Handbook. He will be talking about a new technique for web testing that will soon be available in Burp Suite, and which will enable the automated and manual discovery of many types of vulnerability that currently elude all but the best penetration testers.&lt;br /&gt;
&lt;br /&gt;
'''20:45 Networking'''&lt;br /&gt;
&lt;br /&gt;
This will probably be the only chance this year to hear about both the new features in Burp and ZAP from the respective project leaders, so we expect this event to be very popular - book now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
We plan to hold quarterly events but the precise dates have not been agreed yet.&lt;br /&gt;
&lt;br /&gt;
Please get in touch if you would like to speak at a Manchester event, or can help out in providing facilities, locations, talks or a donation to the cause - we would be delighted to hear from you.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2014 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2014_09_08_Manchester|8th September]]&lt;br /&gt;
&lt;br /&gt;
[[2014_05_13_Manchester|13th May]]&lt;br /&gt;
&lt;br /&gt;
[[2014_02_27_Manchester|27th February]]&lt;br /&gt;
&lt;br /&gt;
'''2013 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2013_04_30_Manchester|30th April]]&lt;br /&gt;
&lt;br /&gt;
'''2012 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2012_09_11_Manchester|11th September]]&lt;br /&gt;
&lt;br /&gt;
[[2012_05_30_Manchester|30th May]]&lt;br /&gt;
&lt;br /&gt;
[[2012_02_01_Manchester|1st February]]&lt;br /&gt;
&lt;br /&gt;
'''2011 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2011_11_16_Manchester|16th November]]&lt;br /&gt;
&lt;br /&gt;
[[2011_08_24_Manchester|24th August]] As part of the Leeds Chapter&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Leeds_UK 22nd June]  As part of the Leeds Chapter&lt;br /&gt;
&lt;br /&gt;
'''2010 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[8th_December_Leeds|8th December]]  As part of the Leeds Chapter&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
* [[User:Simon Ward|Simon Ward]]&lt;br /&gt;
* [[User:Andy_Hornsby-Jones|Andy Hornsby-Jones]]&lt;br /&gt;
&lt;br /&gt;
We are actively seeking more chapter leaders - please get in touch if you would like to become one!&lt;br /&gt;
&lt;br /&gt;
= Sponsorship  =&lt;br /&gt;
&lt;br /&gt;
We are looking for organizations to sponsor the Manchester chapter.&lt;br /&gt;
&lt;br /&gt;
You can sponsor the chapter for one year at the following levels:&lt;br /&gt;
* £300 Silver&lt;br /&gt;
* £600 Gold&lt;br /&gt;
* £1200 Platinum&lt;br /&gt;
&lt;br /&gt;
You can also sponsor a meeting by hosting the event or donating £100.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring the chapter then please get in touch with one of the chapter leaders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Local Organizations  =&lt;br /&gt;
&lt;br /&gt;
Other related organizations in the Manchester area:&lt;br /&gt;
&lt;br /&gt;
* [http://manchester.bcs.org/ BCS Manchester]&lt;br /&gt;
* [http://geekup.org/ GeekUp]&lt;br /&gt;
* [http://madlab.org.uk/ MadLab]&lt;br /&gt;
* [http://libreplanet.org/wiki/Manchester Manchester Free Software]&lt;br /&gt;
* [http://www.manlug.org/ Manchester Linux Users Group]&lt;br /&gt;
* [http://nuksg.org/ Northern UK Security Group]&lt;br /&gt;
* [http://nwdc.org.uk/ North West Digital Communities (NWDC)]&lt;br /&gt;
* [http://www.meetup.com/North-West-Tester-Gathering North West Tester Gathering]&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organization listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-Manchester Manchester mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Dominic Chell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dominic_Chell&amp;diff=188340</id>
		<title>User:Dominic Chell</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dominic_Chell&amp;diff=188340"/>
				<updated>2015-01-21T14:40:20Z</updated>
		
		<summary type="html">&lt;p&gt;Dominic Chell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security consultant, trainer and author with significant experience delivering engagements to financial, government and retail organisations.&lt;br /&gt;
&lt;br /&gt;
Notable achievements:&lt;br /&gt;
* CHECK/CREST Team Leader since 2007&lt;br /&gt;
* Lead author for the Mobile Application Hacker's Handbook (ISBN-10: 1118958500)&lt;br /&gt;
* Founding director of MDSec&lt;br /&gt;
* Subject matter expert for CompTIA Secure iOS Development examination&lt;br /&gt;
&lt;br /&gt;
Public speaking engagements:&lt;br /&gt;
* Breaking Secure Mobile Applications, HackInTheBox 2014 KL&lt;br /&gt;
* Breaking Secure Mobile Apps, BSides MCR 2014&lt;br /&gt;
* Practical Attacks Against Encrypted VoIP Communications, HackInTheBox 2013 KL&lt;br /&gt;
* iOS Application (in)Security, OWASP Manchester March 2012&lt;br /&gt;
* Evaluating iOS Applications, OWASP Dublin February 2012&lt;/div&gt;</summary>
		<author><name>Dominic Chell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dominic_Chell&amp;diff=188339</id>
		<title>User:Dominic Chell</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dominic_Chell&amp;diff=188339"/>
				<updated>2015-01-21T14:37:52Z</updated>
		
		<summary type="html">&lt;p&gt;Dominic Chell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security consultant, trainer and author with significant experience delivering engagements to financial, government and retail organisations.&lt;br /&gt;
&lt;br /&gt;
Notable achievements:&lt;br /&gt;
- CHECK/CREST Team Leader since 2007&lt;br /&gt;
- Lead author for the Mobile Application Hacker's Handbook (ISBN-10: 1118958500)&lt;br /&gt;
- Founding director of MDSec&lt;br /&gt;
- Subject matter expert for CompTIA Secure iOS Development examination&lt;br /&gt;
&lt;br /&gt;
Public speaking engagements:&lt;br /&gt;
- Breaking Secure Mobile Applications, HackInTheBox 2014 KL&lt;br /&gt;
- Breaking Secure Mobile Apps, BSides MCR 2014&lt;br /&gt;
- Practical Attacks Against Encrypted VoIP Communications, HackInTheBox 2013 KL&lt;br /&gt;
- iOS Application (in)Security, OWASP Manchester March 2012&lt;br /&gt;
- Evaluating iOS Applications, OWASP Dublin February 2012&lt;br /&gt;
&lt;br /&gt;
Training engagements:&lt;br /&gt;
- The Mobile App Security Bootcamp, 44Con 2014&lt;br /&gt;
- The Mobile App Security Bootcamp, AppSecEU 2014&lt;br /&gt;
&lt;br /&gt;
Specialties: mobile security, C/C++/Java code review, reverse engineering, web application testing,  infrastructure penetration testing, vulnerability research and exploit development&lt;/div&gt;</summary>
		<author><name>Dominic Chell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IOS_Developer_Cheat_Sheet&amp;diff=133670</id>
		<title>IOS Developer Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IOS_Developer_Cheat_Sheet&amp;diff=133670"/>
				<updated>2012-07-31T09:41:09Z</updated>
		
		<summary type="html">&lt;p&gt;Dominic Chell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction =&lt;br /&gt;
This document is written for iOS app developers and is intended to provide a set of basic pointers to vital aspects of developing secure apps for Apple’s iOS operating system. It follows the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Top 10 Risks] list.&lt;br /&gt;
&lt;br /&gt;
= Basics =&lt;br /&gt;
From a user perspective, two of the best things one can do to protect her iOS device are: enable strong passwords, and [https://www.owasp.org/index.php/Mobile_Jailbreaking_Cheat_Sheet refrain from jailbreaking the device]. For developers, both of these issues are problematic, as they are not verifiable within an app’s sandbox environment. (Apple previously had an API for testing devices to see if they are jailbroken, but that API was deprecated in 2010.) For enterprises, strong passwords, along with dozens of other security configuration attributes can be managed and enforced via a Mobile Device Management (MDM) product. Small businesses and individuals with multiple devices can use Apple’s iPhone Configuration Utility (http://www.apple.com/support/iphone/enterprise/) and Apple Configurator (available in the Mac App Store) to build secure configuration profiles and deploy them on multiple devices.&lt;br /&gt;
&lt;br /&gt;
= Remediation’s to OWASP Mobile Top 10 Risks =&lt;br /&gt;
== Insecure Data Storage (M1) ==&lt;br /&gt;
Without a doubt, the biggest risk faced by mobile device consumers comes from a lost or stolen device. The information stored on the device is thus exposed to anyone who finds or steals another person’s device. It is largely up to the apps on the device to provide adequate protection of any data they store. Apple’s iOS provides several mechanisms for protecting data. These built in protections are quite adequate for most consumer-grade information. For more stringent security requirements (e.g., financial data), additional protections beyond those provided by Apple can be built into an application.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
In general, an app should store locally only the data that is required to perform its functional tasks. This includes side channel data such as system logging (see M8 below). For any form of sensitive data, storing plaintext data storage in an app’s sandbox (e.g., ~/Documents/* ) should always be avoided. Consumer-grade sensitive data should be stored in secure containers using Apple-provided APIs.&lt;br /&gt;
* Small amounts of data, such as user authentication credentials, session tokens, etc., can be securely stored in the device’s Keychain (see Keychain Services Reference in Apple’s iOS Developer Library).&lt;br /&gt;
* For larger, or more general types of data, Apple’s File Protection mechanism can safely be used (see NSData Class Reference for protection options).&lt;br /&gt;
To more securely protect static data, consider using a third party encryption API that is not encumbered by the inherent weaknesses in Apple’s encryption (e.g., keying tied to user’s device passcode, which is often a 4-digit PIN). Freely available examples include SQLcipher (see http://sqlcipher.net).&lt;br /&gt;
&lt;br /&gt;
== Weak Server Side Controls (M2) ==&lt;br /&gt;
Although most server side controls are in fact necessary to handle on the server side — and as such we refer the reader to the [[Web Service Security Cheat Sheet]]—there are several things that can be done on the mobile that aid in the work to be done on the server.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Design and implement the mobile client and the server to support a common set of security requirements. For example, information deemed sensitive on the server should be handled with equivalent due caution on the client side.&lt;br /&gt;
Perform positive input validation and canonicalization on all client-side input data. Use regular expressions and other mechanisms to ensure that only allowable data may enter the application at the client end.&lt;br /&gt;
Perform output encoding on untrusted data where feasible.&lt;br /&gt;
&lt;br /&gt;
== Insufficient Transport Layer Protection (M3) ==&lt;br /&gt;
Exposing sensitive data to eavesdropping attacks is a common issue with all networked applications, and iOS mobile apps are no exception.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Design and implement all apps under the assumption that they will be used on the most wide-open Wi-Fi networks on the planet.&lt;br /&gt;
Make an inventory of all app data that must be protected while in transit. (Protections should include confidentiality as well as integrity.) The inventory should include authentication tokens, session tokens, as well as application data directly.&lt;br /&gt;
Ensure SSL/TLS encryption is used when transmitting or receiving all inventoried data. (See CFNetwork Programming Guide.)&lt;br /&gt;
Ensure your app only accepts properly validated SSL certificates. (CA chain validation is routinely disabled in testing environments; ensure your app has removed any such code prior to public release.)&lt;br /&gt;
Verify through dynamic testing that all inventoried data is adequately protected throughout the operation of the app.&lt;br /&gt;
Verify through dynamic testing that forged, self-signed, etc., certificates cannot be accepted by the app under any circumstances.&lt;br /&gt;
&lt;br /&gt;
== Client Side Injection (M4) ==&lt;br /&gt;
Data injection attacks are as real in mobile apps as they are in web apps, although the attack scenarios tend to differ (e.g., exploiting URL schemes to send premium text messages or toll phone calls).&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
In general, follow the same rules as a web app for input validation and output escaping.&lt;br /&gt;
Canonicalize and positively validate all data input.&lt;br /&gt;
Use parameterized queries, even for local SQLite/SQLcipher calls. &lt;br /&gt;
When using URL schemes, take extra care in validating and accepting input, as any app on the device is able to call a URL scheme.&lt;br /&gt;
When building a hybrid web/mobile app, keep the native/local capabilities of the app to a bare minimum required. That is, maintain control of all UIWebView content and pages, and prevent the user from accessing arbitrary, untrusted web content.&lt;br /&gt;
== Poor Authorization and Authentication (M5) ==&lt;br /&gt;
Although largely a server side control, some mobile features (e.g., unique device identifiers) and common uses can exacerbate the problems surrounding securely authenticating and authorizing users and other entities.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
In general follow the same rules as a web app for authentication and authorization.&lt;br /&gt;
Never use a device identifier (e.g., UDID , IP number, MAC address, IMEI) to identify a user or session.&lt;br /&gt;
Avoid when possible “out-of-band” authentication tokens sent to the same device as the user is using to log in (e.g., SMS to the same iPhone).&lt;br /&gt;
Implement strong server side authentication, authorization, and session management (control # 4.1-4.6).&lt;br /&gt;
Authenticate all API calls to paid resources (control 8.4).&lt;br /&gt;
== Improper Session Handling (M6) ==&lt;br /&gt;
Similarly, session handling is in general, principally a server task, but mobile devices tend to amplify traditional problems in unforeseen ways. For example, on mobile devices, “sessions” often last far longer than on traditional web applications.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
For the most part, follow sound session management practices as you would for a web application, with a few twists that are specific to mobile devices.&lt;br /&gt;
Never use a device identifier (e.g., UDID, IP number, MAC address, IMEI) to identify a session. (Control 1.13)&lt;br /&gt;
Use only tokens that can be quickly revoked in the event of a lost/stolen device, or compromised session.&lt;br /&gt;
Protect the confidentiality and integrity of session tokens at all times (e.g., always use SSL/TLS when transmitting).&lt;br /&gt;
Use only trustworthy sources for generating sessions.&lt;br /&gt;
== Security Decisions via Untrusted Inputs (M7) ==&lt;br /&gt;
While iOS does not give apps many channels for communicating among themselves, some exist—and can be abused by an attacker via data injection attacks, malicious apps, etc.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
The combination of input validation, output escaping, and authorization controls can be used against these weaknesses.&lt;br /&gt;
Canonicalize and positively validate all input data, particularly at boundaries between apps.&lt;br /&gt;
When using URL schemes, take extra care in validating and accepting input, as any app on the device is able to call a URL scheme.&lt;br /&gt;
Contextually escape all untrusted data output, so that it cannot change the intent of the output itself.&lt;br /&gt;
Verify the caller is permitted to access any requested resources. If appropriate, prompt the user to allow/disallow access to the requested resource.&lt;br /&gt;
== Side Channel Data Leakage (M8) ==&lt;br /&gt;
Side channels refer here to data I/O generally used for administrative or non-functional (directly) purposes, such as web caches (used to optimize browser speed), keystroke logs (used for spell checking), and similar. Apple’s iOS presents several opportunities for side channel data to inadvertently leak from an app, and that data is often available to anyone who has found or stolen a victim’s device. Most of these can be controlled programmatically in an app.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Design and implement all apps under the assumption that the user’s device will be lost or stolen.&lt;br /&gt;
Start by identifying all potential side channel data present on a device. These sources should include, at a bare minimum: web caches, keystroke logs, screen shots, system logs, and cut-and-paste buffers. Be sure to include any third party libraries used.&lt;br /&gt;
Never include sensitive data (e.g., credentials, tokens, PII) in system logs.&lt;br /&gt;
Control iOS’s screenshot behavior to prevent sensitive app data from being captured when an app is minimized.&lt;br /&gt;
Disable keystroke logging for the most sensitive data, to prevent it from being stored in plaintext on the device.&lt;br /&gt;
Disable cut-and-paste buffer for the most sensitive data, to prevent it from being leaked outside of the app.&lt;br /&gt;
Dynamically test the app, including its data stores and communications channels, to verify that no sensitive data is being inappropriately transmitted or stored.&lt;br /&gt;
== Broken Cryptography (M9) ==&lt;br /&gt;
Although the vast majority of cryptographic weaknesses in software result from poor key management, all aspects of a crypto system should be carefully designed and implemented. Mobile apps are no different in that regard.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Never “hard code” or store cryptographic keys where an attacker can trivially recover them. This includes plaintext data files, properties files, and compiled binaries.&lt;br /&gt;
Use secure containers for storing crypto keys; alternately, build a secure key exchange system where the key is controlled by a secure server, and never stored locally on the mobile device.&lt;br /&gt;
Use only strong crypto algorithms and implementations, including key generation tools, hashes, etc.&lt;br /&gt;
Use platform crypto APIs when feasible; use trusted third party code when not.&lt;br /&gt;
Consumer-grade sensitive data should be stored in secure containers using Apple-provided APIs.&lt;br /&gt;
* Small amounts of data, such as user authentication credentials, session tokens, etc., can be securely stored in the device’s Keychain (see Keychain Services Reference in Apple’s iOS Developer Library).&lt;br /&gt;
* For larger, or more general types of data, Apple’s File Protection mechanism can safely be used (see NSData Class Reference for protection options).&lt;br /&gt;
To more securely protect static data, consider using a third party encryption API that is not encumbered by the inherent weaknesses in Apple’s encryption (e.g., keying tied to user’s device passcode, which is often a 4-digit PIN). Freely available examples include SQLcipher (see http://sqlcipher.net).&lt;br /&gt;
&lt;br /&gt;
== Sensitive Information Disclosure (M10) ==&lt;br /&gt;
All sorts of sensitive data can leak out of iOS apps. Among other things to remember at all times, each app’s compiled binary code is available on the device, and can be reverse engineered by a determined adversary.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Anything that must truly remain private should not reside on the mobile device; keep private information (e.g., algorithms, proprietary information) on the server.&lt;br /&gt;
If private information must be present on a mobile device, ensure it remains in process memory and is never unprotected if it is stored on the device.&lt;br /&gt;
Never hard code or otherwise trivially store passwords, session tokens, etc.&lt;br /&gt;
Strip binaries prior to shipping, and be aware that compiled executable files can still be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
= References and Further Reading =&lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 Mobile Risks presentation, Appsec USA, Minneapolis, MN, 23 Sept 2011. Jack Mannino, Mike Zusman, and Zach Lanier.&lt;br /&gt;
&lt;br /&gt;
“iOS Security”, Apple, May 2012, http://images.apple.com/iphone/business/docs/iOS_Security_May12.pdf &lt;br /&gt;
&lt;br /&gt;
“Deploying iPhone and iPad: Apple Configurator”, Apple, March 2012, http://images.apple.com/iphone/business/docs/iOS_Apple_Configurator_Mar12.pdf &lt;br /&gt;
&lt;br /&gt;
“iPhone OS: Enterprise Deployment Guide”, Apple, 2010, http://manuals.info.apple.com/en_US/Enterprise_Deployment_Guide.pdf &lt;br /&gt;
&lt;br /&gt;
“iPhone in Business”, Apple resources, http://www.apple.com/iphone/business/resources/ &lt;br /&gt;
&lt;br /&gt;
Apple iOS Developer website.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;iOS Application (in)Security&amp;quot;, MDSec - May 2012, http://www.mdsec.co.uk/research/iOS_Application_Insecurity_wp_v1.0_final.pdf&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Ken van Wyk ken[at]krvw.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Dominic Chell</name></author>	</entry>

	</feed>