Skip to content

defdeveu/lab.ios.DVIAv2

Repository files navigation

lab.ios.DVIA-v2

DVIA-v2 written in Swift along with additional vulnerabilities

Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This project is developed and maintained by @prateekg147. The vulnerabilities and solutions covered in this app are tested up to iOS 11. The current version is writen in Swift and has the following vulnerabilities.

  1. Local Data Storage
  2. Jailbreak Detection
  3. Excessive Permissions
  4. Runtime Manipulation
  5. Anti Anti Hooking/Debugging
  6. Binary Protection
  7. Touch/Face ID Bypass
  8. Phishing
  9. Side Channel Data Leakage
  10. IPC Issues
  11. Broken Cryptography
  12. Webview Issues
  13. Network Layer Security
  14. Application Patching
  15. Sensitive Information in Memory

Installing DVIA on any iOS device

The best way to install DVIA is using Cydia Impactor

Steps

  1. Create an Apple ID https://appleid.apple.com/account
  2. Download Impactor, make sure the device you want to install the app on is connected to your computer. Now drag and drop the IPA file to Impactor.
  3. Enter your Apple ID credentials. App will install on the device
  4. Go to your device, Settings -> General -> Device Management. Select the Apple ID you used to install the app. Click on Verify App under DVIAv2.

Compiling DVIA using Xcode

Steps

  1. Clone the DVIA repo , git clone https://github.com/prateek147/DVIA-v2
  2. cd to the project root directory where the Podfile is present (/DVIA-v2/DVIA-v2). Then run pod install
  3. Open the DVIA-v2.xcworkspace file with Xcode. You can now directly run the app on a simulator.
  4. For running on the device, go under Project settings in Xcode on the top left, head over to the General tab and under Signing, enter credentials for your Apple ID.
  5. Now you can build and run the project on the device. You will have to trust the app again by going under Settings -> General -> Device Management.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published