fbpx

iOS Penetration Testing Lab Environment

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn
vulnerable. Its main goal is to provide a platform to mobile security
enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This application covers all the
common vulnerabilities found in iOS applications (following OWASP top 10
mobile risks) and contains several challenges that the user can try.
This application also contains a section where a user can read various
articles on iOS application security.

Vulnerabilities and Challenges Include …

  • Insecure Data Storage
  • Extension Vulnerabilities
  • Attacks on third party libraries
  • Jailbreak Detection
  • Runtime Manipulation
  • Piracy Detection
  • Sensitive information in memory
  • Transport Layer Security (http, https, cert pinning)
  • Client Side Injection
  • Information Disclosure
  • Broken Cryptography
  • Security Decisions via Untrusted input
  • Side channel data leakage
  • Application Patching

All these vulnerabilities and their solutions have been tested up to iOS 8.2
The app also contains a section on iOS Application Security
Tutorials for those who want to learn iOS Application Pentesting. Every
challenge/vulnerability has a link for a tutorial that users can read to
learn more on that topic.

This app will only run on devices running iOS 7 or later. Users can
download the source code and run the application on previous versions of
iOS as well.

Download at

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...