• Stars
    star
    851
  • Rank 53,558 (Top 2 %)
  • Language
    Swift
  • License
    MIT License
  • Created almost 7 years ago
  • Updated 8 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This project is developed and maintained by @prateekg147. The vulnerabilities and solutions covered in this app are tested up to iOS 11. The current version is writen in Swift and has the following vulnerabilities.

DVIA-v2

Powered by 8ksec.io

DVIA-v2 written in Swift along with additional vulnerabilities

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This project is developed and maintained by @prateekg147. The vulnerabilities and solutions covered in this app are tested up to iOS 11. The current version is writen in Swift and has the following vulnerabilities.

  1. Local Data Storage
  2. Jailbreak Detection
  3. Excessive Permissions
  4. Runtime Manipulation
  5. Anti Anti Hooking/Debugging
  6. Binary Protection
  7. Touch/Face ID Bypass
  8. Phishing
  9. Side Channel Data Leakage
  10. IPC Issues
  11. Broken Cryptography
  12. Webview Issues
  13. Network Layer Security
  14. Application Patching
  15. Sensitive Information in Memory

Installing DVIA on any iOS device

The best way to install DVIA from a Mac is using Apple Configurator App. If you are using Windows or Linux, you can use AltStore, Cydia Impactor etc. A paid developer account might be required in some cases.

Compiling DVIA using Xcode

Steps

  1. Clone the DVIA repo , git clone https://github.com/prateek147/DVIA-v2
  2. cd to the project root directory where the Podfile is present (/DVIA-v2/DVIA-v2). Then run pod install
  3. Open the DVIA-v2.xcworkspace file with Xcode. You can now directly run the app on a simulator.
  4. For running on the device, go under Project settings in Xcode on the top left, head over to the General tab and under Signing, enter credentials for your Apple ID.
  5. Now you can build and run the project on the device. You will have to trust the app again by going under Settings -> General -> Device Management.

More Repositories

1

DVIA

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This application covers all the common vulnerabilities found in iOS applications (following OWASP top 10 mobile risks) and contains several challenges that the user can try. This application also contains a section where a user can read various articles on iOS application security. This project is developed and maintained by @prateekg147. The vulnerabilities and solutions covered in this app are tested upto iOS 8.1 .
Objective-C
426
star
2

SLAE

All the code written in the "SecurityTube Linux Assembly Expert course"
Python
9
star
3

gdb-demo

A demo app to explain the use of GDB as a debugger for performing runtime analysis. A related article can be found at http://highaltitudehacks.com/2013/11/08/ios-application-security-part-21-arm-and-gdb-basics
Objective-C
8
star
4

localDataStorageDemo

A demo app to demonstrate saving local data insecurely in the application. This app is used in a tutorial that can be found at http://highaltitudehacks.com/2013/10/26/ios-application-security-part-20-local-data-storage-nsuserdefaults
Objective-C
6
star
5

Test

[email protected]
5
star
6

prateek147.github.io

Code for my website HighAltitudeHacks.com
HTML
4
star
7

InsecureCryptography-Demo

A demo application to demonstrate insecure and broken cryptography techniques in IOS Applications. Complete article can be found at http://highaltitudehacks.com/2014/01/17/ios-application-security-part-29-insecure-or-broken-cryptography
Objective-C
4
star
8

Jailbreak-Detector

A simple app with a class named JailbreakDetector to detect whether the IOS device the app is running on is jailbroken or not. A related article can be found at http://highaltitudehacks.com/2013/12/17/ios-application-security-part-24-jailbreak-detection-and-evasion
4
star
9

hah

Personal Blog
HTML
3
star
10

InsecureCryptographyDecryptor

A demo application to decrypt a weak encryption technique followed in https://github.com/prateek147/InsecureCryptography
Objective-C
3
star
11

hah-website

SCSS
1
star