This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP DVIA"

From OWASP
Jump to: navigation, search
(Created page with "= Main = <b>Welcome to the Damn Vulnerable iOS Application home page.</b> Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile t...")
 
Line 26: Line 26:
 
= Project About =
 
= Project About =
  
{{:Projects/OWASP iGoat Project | Project About}}
+
{{:Projects/OWASP DVIA Project | Project About}}
  
 
<br> __NOTOC__ <headertabs />  
 
<br> __NOTOC__ <headertabs />  

Revision as of 02:02, 4 February 2014

Welcome to the Damn Vulnerable iOS Application home page.

Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.

Current Challenge Categories:

  • Insecure Data Storage (4 exercises)
  • Jailbreak Detection (2 exercises)
  • Runtime Manipulation (3 exercises)
  • Transport Layer Security (1 exercise)
  • Client Side Injection (1 exercise)
  • Broken Cryptography (1 exercise)
  • Binary Patching (4 exercises)