OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS
This is a Swift version of original iGoat Objective C project. Using OWASP iGoat, you can learn exploiting and defending vulnerabilities in iOS Swift applications. Developed using Swif 4 and Ruby iGoat (Objective C) was presented at:
OWASP TOP 10 Mobile
- Reverse Engineering
- Runtime Analysis
- Data Protection (Rest)
- Data Protection (Transit)
- Key Management
- Tampering
- Injection Flaws
- Broken Cryptography
- Memory Management
- URL Scheme Attack
- Social Engineering
- SSL Pinning
- Authentication
- Jailbreak Detection
- Side Channel Data Leaks
- Cloud Misconfiguration
- Crypto Challenges
Documentation: iGoat Wiki
iGoat Quick Setup
git clone https://github.com/OWASP/iGoat-Swift.git
and open iGoat-Swift.xcodeproj with xcode.Setup iGoat Server Navigate to server > docker_packaging and then user command
docker compose up
Using Cydia Repo - Open Cydia -> Sources -> Edit and add source http://swiftigoat.yourepo.com/ and then search for iGoat and install it.
Project Lead - Swaroop Yermalkar
Lead Developer - Anthony Gonsalves
Architecture
Via: feedproxy.google.com
OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS
Reviewed by Anónimo
on
18:39
Rating: