Главная
Study mode:
on
1
Intro
2
About me
3
Agenda
4
Why Care
5
Your Smartphone
6
WhatsApp
7
Phone ID
8
Challenges
9
Smartphone Robbery
10
Jailbreak
11
PIN bruteforce
12
About iGoat
13
Challenges for enterprises
14
Approach
15
How it works
16
Best thing about iGoat
17
How to contribute
18
Demo Runtime Analysis
19
Demo
20
ServerSide Key Storage
21
URL Scheme
22
Cloud Miss Configuration
23
Conclusion
Description:
Explore iOS app security and penetration testing techniques through OWASP iGoat, an open-source self-learning tool for developers and mobile app pentesters. Learn about major security pitfalls in iOS development and how to avoid them through a series of hands-on lessons covering client-server architecture, exploitation techniques, and remediation strategies. Discover the tool's support for various iDevices and iOS versions, and gain insights into setting up iGoat, exploiting latest vulnerabilities, and contributing to the project. Dive into practical demonstrations of runtime analysis, server-side key storage, URL scheme vulnerabilities, and cloud misconfiguration issues. Understand the challenges faced by enterprises in mobile app security and how iGoat addresses them through its structured approach to learning and problem-solving.

iGoat: A Self-Learning Tool for iOS App Security Testing

OWASP Foundation
Add to list