This is a Swift version of original iGoat project. Using OWASP iGoat, you can learn exploiting and defending vulnerabilities in iOS Swift applications. Developed using []()
iGoat (Objective C) was presented at:
Vulnerabilities Covered (version 1.0): Documentation: https://docs.igoatapp.com/
Summary | Snapshot |
---|---|
OWASP TOP 10 Mobile Reverse Engineering Runtime Analysis Data Protection (Rest) Data Protection (Transit) Key Management Tampering Injection Flaws Broken Cryptography Memory Management URL Scheme Attack Social Engineering SSL Pinning Authentication Jailbreak Detection Side Channel Data Leaks Cloud Misconfiguration* Crypto Challenges |
Documentation: iGoat Wiki
iGoat Quick Setup git clone https://github.com/OWASP/iGoat-Swift.git
and open iGoat-Swift.xcodeproj with xcode.
Setup iGoat Server Navigate to server > docker_packaging and then use command docker compose up
Using Cydia Repo - Open Cydia -> Sources -> Edit and add source http://swiftigoat.yourepo.com/ and then search for iGoat and install it.
Project Lead - Swaroop Yermalkar
Lead Developer - Anthony Gonsalves
To contribute to iGoat project, please contact Swaroop ( swaroop.yermalkar@owasp.org or @swaroopsy )
Junard Lebajan
Tim
masbog
Arun
Your name can be here :) We give cool iGoat t-shirt and swag!