OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS


This is a Swift version of original iGoat Objective C project. Using OWASP iGoat, you can learn exploiting and defending vulnerabilities in iOS Swift applications. Developed using Swif 4 and Ruby iGoat (Objective C) was presented at:

OWASP TOP 10 Mobile 

  • Reverse Engineering
  • Runtime Analysis
  • Data Protection (Rest)
  • Data Protection (Transit)
  • Key Management
  • Tampering
  • Injection Flaws
  • Broken Cryptography
  • Memory Management
  • URL Scheme Attack
  • Social Engineering
  • SSL Pinning
  • Authentication
  • Jailbreak Detection
  • Side Channel Data Leaks
  • Cloud Misconfiguration
  • Crypto Challenges


Documentation: iGoat Wiki
iGoat Quick Setup git clone https://github.com/OWASP/iGoat-Swift.gitand open iGoat-Swift.xcodeproj with xcode.
Setup iGoat Server Navigate to server > docker_packaging and then user command docker compose up
Using Cydia Repo - Open Cydia -> Sources -> Edit and add source http://swiftigoat.yourepo.com/ and then search for iGoat and install it.

Project Lead - Swaroop Yermalkar
Lead Developer - Anthony Gonsalves

Architecture




Source: feedproxy.google.com
OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS Reviewed by Anonymous on 3:37 PM Rating: 5