This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label iOS. Show all posts
Showing posts with label iOS. Show all posts

ooniprobe - Measure Internet Censorship & Speed


Interested in collecting evidence of Internet censorship? Curious about the speed and performance of the network that you are using?

By running the tests in this app, you will examine the following:
  • Blocking of websites 
  • Presence of systems that could be responsible for censorship and/or surveillance
  • Speed and performance of your network

These tests have been developed by the Open Observatory of Network Interference (OONI), a free software project (under The Tor Project) that aims to uncover **Internet censorship** around the world. Since 2012, OONI has collected millions of network measurements across more than 90 countries, shedding light on multiple cases of network interference. By running these tests, you will help increase *transparency* around Internet censorship and network interference around the world.

Collecting evidence of Internet censorship.

OONI's web connectivity test is designed to examine whether websites are blocked and if so, how. This test, in particular, attempts to determine whether access to sites is blocked through DNS tampering, TCP/IP blocking, or by a transparent HTTP proxy. By knowing how access to sites is interfered with, you can more easily evaluate how to circumvent that specific type of censorship. As OONI is committed to transparency through the publication of all network measurement data, you can use it as evidence of any censorship events that you come across.



Detecting systems responsible for censorship and surveillance.


Various types of proxy technologies are used in networks for implementing censorship, surveillance, and traffic manipulation. OONI's HTTP invalid request line test is designed to uncover the presence of such systems within tested networks. However, it's important to point out that not all systems that you might find are necessarily responsible for censorship and/or surveillance! Many proxy technologies, for example, are used in networks for caching purposes.

Measuring the speed and performance of your network.

Sometimes the network that we are using doesn't work as well as we'd like it to. OONI's implementation of the Network Diagnostic Test (NDT) attempts to measure the speed of your network by connecting to mLab servers near you and by subsequently uploading and downloading random data. In doing so, NDT collects low level TCP/IP information that can help characterize the speed and performance of your network. Such information can also be useful in examining cases of throttling.

Open data.

OONI publishes all network measurement data that it collects and processes because open data allows third parties to conduct independent studies, to verify OONI findings and/or to answer other research questions. Such data also helps increase transparency around Internet censorship and various forms of network interference. All data is published on OONI Explorer: https://explorer.ooni.torproject.org/.



Free software.

All OONI tests, as well as its NDT implementation, are based on free and open source software. You can find the source code through the following link:

Attention. Running ooniprobe might be against the terms of service of your ISP or legally questionable in your country. By running ooniprobe you will connect to web services which may be banned, and use web censorship circumvention methods such as Tor. The OONI project will publish data submitted by probes, possibly including your IP address or other identifying information. In addition, your use of ooniprobe will be clear to anyone who has access to your computer, and to anyone who can monitor your Internet connection (such as your employer, ISP or government).

Screenshots


Download ooniprobe (Android)

Download ooniprobe (IOs)

OWASP iOSForensic - Tool to help in forensics analysis on iOS


OWASP iOSForensic is a python tool to help in forensics analysis on iOS.
It get files, logs, extract sqlite3 databases and uncompress .plist files in xml.

OWASP iOSForensic provides:
  • Application's files
  • Conversion of .plist files in XML
  • Extract all databases
  • Conversion of binary cookies
  • Application's logs
  • A List of all packages
  • Extraction multiple packages

Options

  • -h --help : show help message
  • -a --about : show informations
  • -v --verbose : verbose mode
  • -i --ip : local ip address of the iOS terminal
  • -p --port : ssh port of the iOS terminal (default 22)
  • -P --password : root password of the iOS terminal (default alpine)
Examples:
./iOSForensic.py -i 192.168.1.10 [OPTIONS] APP_NAME.app INCOMPLETE_APP_NAME APP_NAME2_WITHOUT_DOT_APP
./iOSForensic.py -i 192.168.1.10 -p 1337 -P pwd MyApp.app angry MyApp2


iRET - iOS Reverse Engineering Toolkit


iOS Reverse Engineering Toolkit o iRet es un conjunto de herramientas que ayudan al auditor de seguridad a llevar a cabo tareas comunes de forma automática. Dichas tareas se enfocan en análisis e ingeniería inversa de aplicaciones iOS, plataforma móvil de Apple (iPhone/iPad).

De entre las tareas que este toolkit es capaz de automatizar, tenemos:
  • Binary Analysis (basado en otool)
  • Keychain Analysis (keychain_dumper)
  • Database Analysis (sqlite3)
  • Log Viewer
  • Plist Viewer
  • Header Files
  • Create, edit, save and build theos tweaks
  • Display cached screenshots

[DVIA] Damn Vulnerable iOS Application


Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment.

This application covers all the common vulnerabilities found in iOS applications (following OWASP top 10 mobile risks) and contains several challenges that the user can try.

Vulnerabilities and Challenges Included
  • Insecure Data Storage
  • Jailbreak Detection
  • Runtime Manipulation
  • Transport Layer Security
  • Client Side Injection
  • Information Disclosure
  • Broken Cryptography
  • Application Patching

All these vulnerabilities and their solutions have been tested upto IOS 7.0.4.
Every challenge/vulnerability has a link for a tutorial that users can read to learn more on that topic.