This is the official GitHub Repository of the OWASP Mobile Application Security Testing Guide (MASTG). The MASTG is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS).
- ⬇️ Download the latest PDF
- ✅ Get the latest Mobile App Security Checklists
- ⚡ Contribute!
- 💥 Play with our Crackmes
The OWASP MASVS and MASTG are trusted by the following platform providers and standardization, governmental and educational institutions. Learn more.
MAS Advocates are industry adopters of the OWASP MASVS and MASTG who have invested a significant and consistent amount of resources to push the project forward by providing consistent high-impact contributions and continuously spreading the word. Learn more.
- GitHub Discussions
- #project-mobile-app-security (Get Invitation)
- @OWASP_MAS (Official Account)
- @bsd_daemon (Sven Schleier, Project Lead) @grepharder (Carlos Holguera, Project Lead)
The MASTG is an open source effort and we welcome all kinds of contributions and feedback.
Help us improve & join our community:
Contribute with content:
- 💡 Propose ideas or suggest improvements (if it qualifies we'll promote it to an Issue)
- 📄 Create a Pull Request for concrete fixes (e.g. grammar/typos) or content already approved by the core team.
Before you start contributing, please check our pages "How Can You Contribute?" and "Getting Started". If you have any doubts please contact us.
- Get the printed version via lulu.com
- Get the e-book on leanpub.com (please consider purchasing it to support our project or make a donation)
- Check our Document generation scripts
- Foreword
- Frontispiece
- OWASP MASVS and MASTG Adoption
- Acknowledgements
- Introduction to the OWASP Mobile Application Security Project
- Mobile Application Taxonomy
- Mobile Application Security Testing
- Mobile App Authentication Architectures
- Testing Network Communication
- Cryptography in Mobile Apps
- Testing Code Quality
- Tampering and Reverse Engineering
- Testing User Privacy Protection
- Platform Overview
- Android Basic Security Testing
- Data Storage on Android
- Android Cryptographic APIs
- Local Authentication on Android
- Android Network Communication
- Android Platform APIs
- Code Quality and Build Settings for Android Apps
- Tampering and Reverse Engineering on Android
- Android Anti-Reversing Defenses
- Platform Overview
- iOS Basic Security Testing
- Data Storage on iOS
- iOS Cryptographic APIs
- Local Authentication on iOS
- iOS Network Communication
- iOS Platform APIs
- Code Quality and Build Settings for iOS Apps
- Tampering and Reverse Engineering on iOS
- iOS Anti-Reversing Defenses
Please note that the MASTG focuses primarily on native apps. These are apps built with Java or Kotlin using the Android SDK for Android or built with Swift or Objective-C using the Apple SDKs for iOS. Apps using frameworks such as Nativescript, React-native, Xamarin, Cordova, etc. are not within the main focus of the MASTG. However, some essential controls, such as certificate pinning, have been explained already for some of these platforms. For now, you can take a look and contribute to the work-in-progress being made in the discussions "Hybrid application checklist experiments" and "Basic Guidelines for Hybrid Apps".