MSTG Book Sprint - Mobile App Security Testing


owasp mstg

Why

As of today, no widely accepted standard for mobile app security exists. The goal of our project is to rectify this situation. In addition to a mobile appsec security standard, we are producing a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results. We aim to release the guide in the form of a free e-book and potentially a printed book by the end of this year.

What

The objective of this working session is to complete a first draft of the Mobile Security Testing Guide (MSTG). Tasks include:

  • Write original content, such as describing testing processes and writing test cases
  • Proofread and technical edit to improve the overall quality of the MSTG

Participants may join working groups organised along the main topics covered in the guide. Work will be split between working groups based on mobile OS and topics as listed below.

This working session focuses high-level testing methodology, including scoping, test setup and reporting. We describe basic technical processes such as setting up a web proxy, API monitoring using existing tools, etc.

Associated chapters in the MSTG:

Outcomes

This Working Session continued on content creation, revision and editing of the Mobile Security Testing Guide

Synopsis and Takeaways

Develop existing content on Test Case Exception Handling. Testing Authentication and Session Management Update high level methodology of mobile security testing

How to Join

Follow the “Edit this page here” link at the bottom of this page and add yourself to the “participants” field. Signing up is not mandatory, but helps us to better organize the sessions.

More things to do once you have signed up:

  • Familiarize yourself with the existing content. Or even better, start contributing right away :)
  • Ping us on the OWASP MSTG Slack channel (sushi2k or bernhardm).
  • If you have rooted Android / jailbroken iOS devices, please bring them along to the session.

Who

The target audience for this Working Session is:

  • Developers
  • Security Testers
  • Reverse Engineers
  • Everyone else with good writing skills and some technical know-how :)

Working materials



Back to list of all Working Sessions and Tracks

Edit this page here