Skip to content

Commit

Permalink
Upgrade Link Checker (#1956)
Browse files Browse the repository at this point in the history
* Upgrade Link Checker

* Correcting link errors based on failed checks (#1955)

* sh3llc0d3r.com links replaced with web archive

sh3llc0d3r.com stopped resolving replaced links with web archive links.

* converting http to https

* stingray technologies correcting url

stingray technologies url has shifted.

* fix links

* rename checks

* add 403 alive

* add 200 alive code

Co-authored-by: Anant Shrivastava <anant@anantshri.info>
  • Loading branch information
cpholguera and anantshri committed Oct 29, 2021
1 parent 88276cf commit 15e2411
Show file tree
Hide file tree
Showing 7 changed files with 9 additions and 8 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/checkLinks.yml
@@ -1,4 +1,4 @@
name: Check Markdown Links
name: URLs Checker

on:
push:
Expand All @@ -17,7 +17,7 @@ jobs:
with:
fetch-depth: 1
- name: link-check
uses: gaurav-nelson/github-action-markdown-link-check@820c0581641b6e2fb34ae4d5f93ef4d841fb37e6
uses: gaurav-nelson/github-action-markdown-link-check@v1
with:
use-quiet-mode: 'yes'
use-verbose-mode: 'yes'
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/checkLint.yml
@@ -1,4 +1,4 @@
name: Check Markdown Markup
name: Markdown Linter

on: [push, pull_request]

Expand Down
1 change: 1 addition & 0 deletions .github/workflows/config/mlc_config.json
Expand Up @@ -47,5 +47,6 @@
],
"retryOn429": true,
"fallbackRetryDelay": "30s",
"aliveStatusCodes": [200, 403],
"see": "https://github.com/tcort/markdown-link-check#config-file-format"
}
2 changes: 1 addition & 1 deletion Document/0x06a-Platform-Overview.md
Expand Up @@ -129,7 +129,7 @@ A language.lproj folder exists for each language that the application supports.

![OWASP MSTG](Images/Chapters/0x06a/iOS_project_folder.png) \

On a jailbroken device, you can recover the IPA for an installed iOS app using different tools that allow decrypting the main app binary and reconstruct the IPA file. Similarly, on a jailbroken device you can install the IPA file with [IPA Installer](https://github.com/autopear/ipainstaller "IPA Installer"). During mobile security assessments, developers often give you the IPA directly. They can send you the actual file or provide access to the development-specific distribution platform they use, e.g., [HockeyApp](https://hockeyapp.net/ "HockeyApp") or [TestFlight](https://developer.apple.com/testflight/ "TestFlight").
On a jailbroken device, you can recover the IPA for an installed iOS app using different tools that allow decrypting the main app binary and reconstruct the IPA file. Similarly, on a jailbroken device you can install the IPA file with [IPA Installer](https://github.com/autopear/ipainstaller "IPA Installer"). During mobile security assessments, developers often give you the IPA directly. They can send you the actual file or provide access to the development-specific distribution platform they use, e.g. [TestFlight](https://developer.apple.com/testflight/ "TestFlight").

### App Permissions

Expand Down
2 changes: 1 addition & 1 deletion Document/0x06b-Basic-Security-Testing.md
Expand Up @@ -24,7 +24,7 @@ The UDID is a 40-digit unique sequence of letters and numbers to identify an iOS

![OWASP MSTG](Images/Chapters/0x06b/UDID-Finder.png) \

If you are using a macOS version before Catalina, you can find the [UDID of your iOS device via iTunes](https://www.iclarified.com/52179/how-to-find-your-iphones-udid "How to Find Your iPhone\'s UDID"), by selecting your device and clicking on "Serial Number" in the summary tab. When clicking on this you will iterate through different metadata of the iOS device including its UDID.
If you are using a macOS version before Catalina, you can find the [UDID of your iOS device via iTunes](https://medium.com/@igor_marques/how-to-find-an-iphones-udid-2d157f1cf2b9 "How to Find Your iPhone\'s UDID"), by selecting your device and clicking on "Serial Number" in the summary tab. When clicking on this you will iterate through different metadata of the iOS device including its UDID.

It is also possible to get the UDID via various command line tools on macOS while the device is attached via USB:

Expand Down
2 changes: 1 addition & 1 deletion Document/0x08-Testing-Tools.md
Expand Up @@ -1341,7 +1341,7 @@ A tool that loads arbitrary dylibs into running App Store apps. It has built-in
### BinaryCookieReader
A tool to dump all the cookies from the binary Cookies.binarycookies file - <https://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py>
A tool to dump all the cookies from the binary Cookies.binarycookies file - <https://github.com/as0ler/BinaryCookieReader/blob/master/BinaryCookieReader.py>
### Burp Suite Mobile Assistant
Expand Down
4 changes: 2 additions & 2 deletions style_guide.md
Expand Up @@ -214,13 +214,13 @@ When using (A), be sure to escape special characters such as apostrophe (\') or
**Wrong** usage, see "iPhone's":

```markdown
[UDID of your iOS device via iTunes](http://www.iclarified.com/52179/how-to-find-your-iphones-udid "How to Find Your iPhone's UDID")
[UDID of your iOS device via iTunes](https://medium.com/@igor_marques/how-to-find-an-iphones-udid-2d157f1cf2b9 "How to Find Your iPhone's UDID")
```

**Right** usage, see "iPhone\'s":

```markdown
[UDID of your iOS device via iTunes](http://www.iclarified.com/52179/how-to-find-your-iphones-udid "How to Find Your iPhone\'s UDID")
[UDID of your iOS device via iTunes](https://medium.com/@igor_marques/how-to-find-an-iphones-udid-2d157f1cf2b9 "How to Find Your iPhone\'s UDID")
```

When adding links to the **"References"** section at the end of the chapters use `- Title - <url>`, for example:
Expand Down

0 comments on commit 15e2411

Please sign in to comment.