iOS Penetration Testing Lab Environment

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn
vulnerable. Its main goal is to provide a platform to mobile security
enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This application covers all the
common vulnerabilities found in iOS applications (following OWASP top 10
mobile risks) and contains several challenges that the user can try.
This application also contains a section where a user can read various
articles on iOS application security.

Vulnerabilities and Challenges Include …

  • Insecure Data Storage
  • Extension Vulnerabilities
  • Attacks on third party libraries
  • Jailbreak Detection
  • Runtime Manipulation
  • Piracy Detection
  • Sensitive information in memory
  • Transport Layer Security (http, https, cert pinning)
  • Client Side Injection
  • Information Disclosure
  • Broken Cryptography
  • Security Decisions via Untrusted input
  • Side channel data leakage
  • Application Patching

All these vulnerabilities and their solutions have been tested up to iOS 8.2
The app also contains a section on iOS Application Security
Tutorials for those who want to learn iOS Application Pentesting. Every
challenge/vulnerability has a link for a tutorial that users can read to
learn more on that topic.

This app will only run on devices running iOS 7 or later. Users can
download the source code and run the application on previous versions of
iOS as well.

Download at

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.