OWASP Mobile Security Testing Guide
This is the official GitHub Repository of the OWASP Mobile Security Testing Guide (MSTG). The MSTG is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). You can also read the MSTG on Gitbook or download it as an e-book.
The MSTG and the MASVS are being adopted by many companies, standards, and various organizations. Want to find out more? Check our users document listing some of the adopters.
Table-of-Contents
Introduction
- Header
- Foreword
- Frontispiece
- Introduction to the Mobile Security Testing Guide
- Mobile App Taxonomy
- Mobile App Security Testing
General Testing Guide
- Mobile App Authentication Architectures
- Testing Network Communication
- Cryptography in Mobile Apps
- Testing Code Quality
- Tampering and Reverse Engineering
- Testing User Education
Android Testing Guide
- Platform Overview
- Android Basic Security Testing
- Data Storage on Android
- Android Cryptographic APIs
- Local Authentication on Android
- Android Network APIs
- Android Platform APIs
- Code Quality and Build Settings for Android Apps
- Tampering and Reverse Engineering on Android
- Android Anti-Reversing Defenses
iOS Testing Guide
- Platform Overview
- iOS Basic Security Testing
- Data Storage on iOS
- iOS Cryptographic APIs
- Local Authentication on iOS
- iOS Network APIs
- iOS Platform APIs
- Code Quality and Build Settings for iOS Apps
- Tampering and Reverse Engineering on iOS
- iOS Anti-Reversing Defenses
Appendix
Reading the Mobile Security Testing Guide
The release 1.0 of the MSTG was published in June 2018. You can get intermediate builds in multiple formats.
-
Read it on Gitbook. The book is automatically synchronized with the main repo.
-
Check the releases. Here you can find a PDF, an archive containing the sources and a DocX document for any given tagged version. Please note that the documents are generated automatically per tag.
-
Get the book as printed version. A hardcopy of the book can be ordered via lulu.com. This version of the book is not completely aligned with book printing standards, but we are improving each version. If you recognize any issues or mistakes, even small ones, please raise an issue so we can fix it in the next version.
-
Get the e-book. The book is available for free, but you can choose to purchase it at a price of your choosing if you wish to support our project. All funds raised through sales of the e-book go directly into the project budget and will be used to fund production of future releases.
-
Clone the repository and run the document generator (requires pandoc). This produces docx and HTML files in the "Generated" subdirectory.
$ git clone https://github.com/OWASP/owasp-mstg/ $ cd owasp-mstg/Tools/ $ ./generate_document.sh
-
Clone the repository and run the gitbook generator. This produces PDF, Epub and Mobi files in the "Generated" subdirectory.
$ git clone https://github.com/OWASP/owasp-mstg/ $ cd owasp-mstg/Tools/ $ ./gitbookandpdf.sh
You can also use the document index to navigate the master branch of the MSTG.
Contributions, feature requests and feedback
We are searching for additional authors, reviewers and editors. The best way to get started is to browse the existing content. Also, check the issues and the project page for a list of open tasks.
Drop a us line on the Slack channel before you start working on a topic. This helps us to keep track of what everyone is doing and prevent conflicts. You can create a Slack account here:
https://owasp-slack.herokuapp.com/
Before you start contributing, please check our contribution guide which should get you started.
Please note that the MSTG focuses primarily on the native apps. These are apps built with Java or Kotlin using the Android SDK for Android or built with Swift or Objective-C using the Apple SDKs for iOS. Nativescript/React-native/Xamarin/Cordova/... apps are not within the focus of the MSTG. However, some key-controls, such as pinning, have been explained already for some of these platforms. If you are looking for more security recommendations on this field, take a look the work-in-progress Google sheets based on the compliancy checklist 1.1.2:
- Flutter Compliancy Checklist (WIP);
- React-Native Compliancy Checklist (WIP).
- Xamarin Compliancy Checklist (WIP).
If there's something you really want to see in the guide, or you want to suggest an improvement, create an issue issue or ping us on Slack. If the issue is accepted, we will schedule it into one of our milestones.
Authoring Credit
Contributors are added to the acknowledgements table based on their contributions logged by GitHub. The list of names is sorted by the number of lines added. Authors are categorized as follows:
- Project Leader / Author: Manage development of the guide continuously and write a large amount of new content. Project Leadership cannot be achieved if any violations of the Code of Conduct occurred in the past.
- Co-Author: Consistently contribute quality content, at least 2,000 additions logged.
- Top Contributor: Consistently contribute quality content, at least 500 additions logged.
- Contributor: Any form of contribution, at least 50 additions logged.
- Mini-contributor: Everything below 50 additions, e.g. committing a single word or sentence.
- Reviewer: People that haven't submitted their own pull requests, but have created issues or given useful feedback in other ways.
Please ping us or create a pull request if you are missing from the table or in the wrong column (note that we update the table frequently, but not in realtime).
If you are willing to write a large portion of the guide and help consistently drive the project forward, you can join as an author. Be aware that you'll be expected to invest lots of time over several months. Contact Sven Schleier (Slack: Sven), Jeroen Willemsen (Slack: jeroenwillemsen) or Carlos Holguera (Slack: Carlos) for more information.
Crackmes
In the Crackmes folder, you can find a set of mobile apps to hack. Are you able to find the secrets? For more details: check the README.md at the Crackmes folder.