prateek147 / DVIA-v2

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This project is developed and maintained by @prateekg147. The vulnerabilities and solutions covered in this app are tested up to iOS 11. The current version is writen in Swift and has the following vulnerabilities.
http://damnvulnerableiosapp.com
MIT License
894 stars 182 forks source link

where are the solutions? #16

Open ernestang98 opened 1 year ago

KompoD commented 1 year ago

@prateek147, pls give some info ;)

Tony-Y commented 1 year ago

Phil Keeble's Blog Posts

Setting Up For iOS Hacking Insecure iOS Storage - DVIAv2 Part 1 Bypassing JailBreak Detection - DVIAv2 Part 2 Runtime Manipulation - DVIAv2 Part 3 Anti Anti Hooking/Debugging - DVIAv2 Part 4 Bypassing Biometrics - DVIAv2 Part 5 iOS Side Channel Data Leakage - DVIAv2 Part 6 iOS Network Layer Security - DVIAv2 Part 7

pwneddesal commented 4 months ago

Phil Keeble's Blog Posts

Setting Up For iOS Hacking Insecure iOS Storage - DVIAv2 Part 1 Bypassing JailBreak Detection - DVIAv2 Part 2 Runtime Manipulation - DVIAv2 Part 3 Anti Anti Hooking/Debugging - DVIAv2 Part 4 Bypassing Biometrics - DVIAv2 Part 5 iOS Side Channel Data Leakage - DVIAv2 Part 6 iOS Network Layer Security - DVIAv2 Part 7

Jailbreak Detection - Jailbreak Test 1 solution is not updated

Tony-Y commented 4 months ago

@pwnedDesal

The corresponding IPA file is available. Click on the "Download raw file" button to get the IPA file. The whole function of Jailbreak Test 1 is below:

Jailbreak Test1

(Created by r2)

pwneddesal commented 4 months ago

@pwnedDesal

The corresponding IPA file is available. Click on the "Download raw file" button to get the IPA file. The whole function of Jailbreak Test 1 is below:

Jailbreak Test1

(Created by r2)

Thanks. what disassembler you are using

Tony-Y commented 4 months ago

@pwnedDesal

I am using r2: https://github.com/radareorg/radare2