This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP DVIA"
From OWASP
Jason Haddix (talk | contribs) (Created page with "= Main = <b>Welcome to the Damn Vulnerable iOS Application home page.</b> Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile t...") |
Jason Haddix (talk | contribs) |
||
Line 26: | Line 26: | ||
= Project About = | = Project About = | ||
− | {{:Projects/OWASP | + | {{:Projects/OWASP DVIA Project | Project About}} |
<br> __NOTOC__ <headertabs /> | <br> __NOTOC__ <headertabs /> |
Revision as of 02:02, 4 February 2014
Welcome to the Damn Vulnerable iOS Application home page.
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.
Current Challenge Categories:
- Insecure Data Storage (4 exercises)
- Jailbreak Detection (2 exercises)
- Runtime Manipulation (3 exercises)
- Transport Layer Security (1 exercise)
- Client Side Injection (1 exercise)
- Broken Cryptography (1 exercise)
- Binary Patching (4 exercises)