Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

iOS Applications Security Testing: A Comprehensive Cheat Sheet, Lecture notes of Communication

Network SecurityMobile Application SecurityApplication SecurityCybersecurity

A comprehensive cheat sheet on iOS applications security testing. It covers various aspects of iOS security model, iOS application assessment, and mobile risks. The assessment includes client attacks, file system analysis, runtime analysis, binary analysis, network attacks, communication channel analysis, server attacks, and insecure data storage. The document also suggests tools and resources for effective testing.

What you will learn

  • What are the steps to perform runtime analysis on an iOS application?
  • How can you perform file system analysis on an iOS application?
  • What are the different types of attacks on iOS applications?
  • What tools can be used for network traffic analysis in iOS application testing?
  • What are the common vulnerabilities in iOS data storage and how to mitigate them?

Typology: Lecture notes

2021/2022

Uploaded on 08/05/2022

char_s67
char_s67 🇱🇺

4.5

(109)

1.9K documents

Partial preview of the text

Download iOS Applications Security Testing: A Comprehensive Cheat Sheet and more Lecture notes Communication in PDF only on Docsity! Oana Cornea OWASP The Open Web Application Security Project About Me • Oana Cornea • Application Security Analyst at Electronic Arts, in Bucharest, Romania. iOS application assessment iOS application assessment Client attacks File system analysis Runtime analysis Binary analysis Network attacks Communication channel Server attacks iOS application assessment Assessment Insecure data storage Information gathering Application traffic analysis Runtime analysis i Test application OWASP The Open Web Application Security Project YF iTunes Shared Album SP__ First Album Photo Vault Application traffic analysis • Intercept the traffic and analyze the requests and responses using a proxy: Burp, Charles, Mallory Runtime analysis • Disassemble the application (gdb) • Analyze file system interaction • Analyze the application with a debugger (gdb): inspecting objects in memory and calling functions and methods; replacing variables and methods at runtime. Runtime analysis • Runtime analysis protecting features: – Locate the PIE (Position Independent Executable) Check this using the command: otool –hv <app name> – Stack smashing protection - specify the –fstack- protector-all compiler flag. Check this using: otool –I –v <app name> | grep stack . If the application was compiled with the stack smashing protection two undefined symbols will be present: “___stack_chk_fail” and “___stack_chk_guard”. Steps • Hook into the application process using cycript –p [PID] command. • Grab the application delegate instance using UIApp.delegate command. Steps Search the class dump for AppDelegate and look for its interface. The Open Web Application Security Project • Insecure data storage • Avoid storing sensitive data on the device because any data stored locally could be compromised. • Weak server side controls • Harden servers against malicious attacks • Insufficient server side protection • Secure the communication Wrap up - Mobile risks Wrap up - Mobile risks • Client side injection • Implement proper input validation • Poor authorization and authentication • Avoid query string for sensitive data, institute local session timeout • Improper session handling • Review the session management mechanism Wrap up - Mobile risks • Security decisions via untrusted inputs • The combination of input validation, output escaping, and authorization controls can be used against these weaknesses. • Side channel data leakage • Avoid crash logs, debug logs and caching app data. • Broken cryptography • Take advantage of what your platform already provides • Sensitive information disclosure • Anything that must truly remain private should not reside on the mobile device; keep private information (e.g., algorithms, proprietary information) on the server.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved