2017-10-22 19:44:00 +00:00
# Mobile Device Security
The following are several of the resources covered in the Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons.
## OWASP Resources
### OWASP Mobile Security Project
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Home
### OWASP Mobile Top 10:
* https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks
### OWASP Mobile Security Testing Guide:
* https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content
### OWASP Mobile Application Security Verification Standard (MASVS)
* https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf
## Android
2017-10-22 20:44:28 +00:00
### Android Studio
* https://developer.android.com/sdk/index.html
2017-10-22 19:44:00 +00:00
### Android Reverse Engineering Arsenals
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=M-Tools
2017-10-22 20:44:28 +00:00
### APK Tool
* http://ibotpeaches.github.io/Apktool/
2017-10-22 20:45:32 +00:00
### Dex2jar and JD-GUI
Dex2jar and JD-GUI are two different tools that are often used for reverse engineering Android apps. Dex2jar converts .dex files to .jar. JD-GUI is a Java decompiler that can decompile .jar files to the original Java source.
* http://sourceforge.net/projects/dex2jar/
* http://jd.benow.ca
2017-10-22 19:44:00 +00:00
## Apple iOS
### Damn Vulnerable iOS Application (DVIA)
* DVIA Home Page
2017-10-22 19:45:57 +00:00
* http://damnvulnerableiosapp.com
2017-10-22 19:44:00 +00:00
* DVIA OWASP Project Page
2017-10-22 19:45:57 +00:00
* https://www.owasp.org/index.php/OWASP_DVIA
2017-10-22 19:44:00 +00:00
* DVIA Github Source
2017-10-22 19:45:57 +00:00
* https://github.com/prateek147/DVIA
2017-10-22 19:44:00 +00:00
* DVIA Learning Resources
2017-10-22 19:45:57 +00:00
* http://damnvulnerableiosapp.com/#learn