DVIA Solution



01. Insecure Data Storage

011. Plist

012. NSUserDefaults

013. Keychain

014. Core Data


02. Jailbreak Detection

021. Jailbreak Test 1

022. Jailbreak Test 2


03. Runtime Manipulation

031. Login Method 1

032. Login Method 2


04. Piracy Detection

041. Check for Piracy

042. Check for Piracy


05. Security Decision via Untrusted input

051. call


06. Side Channel Data Leakage

061. Device Logs

062. App Screenshot

063. Pasteboard

064. Keystroke logging


07. Transport Layer Protection

071. Send Over HTTP

072. Send Over HTTPS


08. Client Side Injection

081. what is your name ?


09. Broken Cryptography

091. Set a password here


10. Binary Patching

011. Login Method 1

012. Check For Jailbreak

013. Show alert

014. Kill Application


저작자 표시
신고

'40. > 42. iOS' 카테고리의 다른 글

[DVIA] 01. Insecure Data Storage  (0) 2014.09.10
[iOS] Logify  (0) 2014.07.24
[DVIA] Damn Vulnerable iOS Application  (0) 2014.07.21
GikDBG iOS assembly-level debugger iOS 디버거  (3) 2014.07.17
iRET  (0) 2014.07.16
[Cydia App] iDevice VNC용 Veency  (0) 2014.07.16
1 ··· 26 27 28 29 30 31 32 33 34 ··· 121 

카운터

Total : 85,369 / Today : 1 / Yesterday : 31
get rsstistory!