Convert Figma logo to code with AI

OWASP logomastg

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWASP Mobile Security Weakness Enumeration (MASWE) weaknesses, which are in alignment with the OWASP MASVS.

12,409
2,475
12,409
342

Top Related Projects

12,407

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWASP Mobile Security Weakness Enumeration (MASWE) weaknesses, which are in alignment with the OWASP MASVS.

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.

A big list of Android Hackerone disclosed reports and other resources.

4,274

The Leading Security Assessment Framework for Android.

Quick Overview

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS). The MASTG is a valuable resource for security professionals, developers, and researchers involved in mobile app security.

Pros

  • Comprehensive coverage of mobile app security testing techniques
  • Regularly updated to reflect the latest mobile security threats and best practices
  • Open-source and community-driven, ensuring diverse perspectives and contributions
  • Provides detailed guidance for both Android and iOS platforms

Cons

  • Can be overwhelming for beginners due to its extensive content
  • Requires frequent updates to keep pace with rapidly evolving mobile technologies
  • Some sections may become outdated between major revisions
  • Primarily focused on manual testing techniques, with limited coverage of automated tools

Getting Started

To get started with the OWASP MASTG:

  1. Visit the GitHub repository: https://github.com/OWASP/mastg
  2. Read the README.md file for an overview of the project
  3. Navigate to the "Document" folder to access the latest version of the guide
  4. Choose the appropriate format (e.g., PDF, HTML) to view the content
  5. Consider contributing to the project by following the guidelines in the CONTRIBUTING.md file

Note: As this is not a code library, there are no code examples or quick start instructions provided.

Competitor Comparisons

12,407

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWASP Mobile Security Weakness Enumeration (MASWE) weaknesses, which are in alignment with the OWASP MASVS.

Pros of mastg

  • Comprehensive mobile application security testing guide
  • Regularly updated with the latest security best practices
  • Extensive community support and contributions

Cons of mastg

  • Large repository size may be overwhelming for beginners
  • Requires frequent updates to keep pace with evolving mobile technologies

Code comparison

Not applicable, as both repositories refer to the same project. The OWASP/mastg repository is the main and current repository for the Mobile Application Security Testing Guide.

Additional notes

mastg (Mobile Application Security Testing Guide) is a comprehensive resource for mobile app security testing. It covers both Android and iOS platforms, providing detailed guidance on various security aspects. The repository includes:

  • Testing methodologies
  • Vulnerability assessment techniques
  • Best practices for secure mobile app development
  • Code samples and examples

The project is maintained by the Open Web Application Security Project (OWASP) and benefits from contributions from security experts worldwide. It serves as an essential resource for developers, security professionals, and organizations looking to enhance the security of their mobile applications.

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

Pros of Mobile-Security-Framework-MobSF

  • Automated analysis with a user-friendly web interface
  • Supports both static and dynamic analysis of mobile applications
  • Provides detailed reports and vulnerability assessments

Cons of Mobile-Security-Framework-MobSF

  • Primarily focused on automated scanning, which may miss some context-specific vulnerabilities
  • Less comprehensive coverage of mobile security best practices compared to MASTG
  • May require more setup and configuration for advanced use cases

Code Comparison

MASTG focuses on providing guidelines and best practices, so it doesn't have specific code for analysis. However, MobSF includes code for automated analysis. Here's a sample from MobSF:

def scan_file(app_path):
    # Perform static analysis
    static_analyzer = StaticAnalyzer(app_path)
    static_results = static_analyzer.analyze()

    # Perform dynamic analysis
    dynamic_analyzer = DynamicAnalyzer(app_path)
    dynamic_results = dynamic_analyzer.analyze()

    return static_results, dynamic_results

This code snippet demonstrates how MobSF performs both static and dynamic analysis on mobile applications, which is one of its key features compared to MASTG's guideline-focused approach.

The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.

Pros of MobileApp-Pentest-Cheatsheet

  • Concise and easy to navigate, providing quick reference for mobile app pentesters
  • Includes specific tools and commands for various testing scenarios
  • Regularly updated with community contributions

Cons of MobileApp-Pentest-Cheatsheet

  • Less comprehensive than MASTG, focusing mainly on checklists and quick references
  • Limited explanations and in-depth guidance compared to MASTG
  • Lacks the structured learning approach and detailed methodology of MASTG

Code Comparison

MASTG provides more detailed code examples and explanations:

// MASTG example
KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore");
keyStore.load(null);
KeyGenerator keyGenerator = KeyGenerator.getInstance(
    KeyProperties.KEY_ALGORITHM_AES, "AndroidKeyStore");

MobileApp-Pentest-Cheatsheet offers concise command-line examples:

# MobileApp-Pentest-Cheatsheet example
adb shell dumpsys package <package_name>
frida-ps -U | grep <app_name>

Both repositories serve different purposes: MASTG is a comprehensive guide for mobile app security testing, while MobileApp-Pentest-Cheatsheet is a quick reference tool for pentesters. MASTG offers in-depth explanations, methodologies, and best practices, making it suitable for thorough learning and reference. MobileApp-Pentest-Cheatsheet provides concise checklists and commands, making it ideal for quick lookups during penetration testing activities.

A big list of Android Hackerone disclosed reports and other resources.

Pros of Android-Reports-and-Resources

  • More focused on real-world Android security reports and vulnerabilities
  • Regularly updated with recent findings and resources
  • Includes a curated list of Android hacking tools and tutorials

Cons of Android-Reports-and-Resources

  • Less comprehensive coverage of Android security best practices
  • Not as structured or organized as MASTG
  • Lacks detailed explanations and guidelines for secure Android development

Code Comparison

MASTG provides more detailed code examples for secure implementation:

// MASTG example
KeyGenerator keyGenerator = KeyGenerator.getInstance(KeyProperties.KEY_ALGORITHM_AES, "AndroidKeyStore");
keyGenerator.init(new KeyGenParameterSpec.Builder(KEY_NAME, KeyProperties.PURPOSE_ENCRYPT | KeyProperties.PURPOSE_DECRYPT)
    .setBlockModes(KeyProperties.BLOCK_MODE_GCM)
    .setEncryptionPaddings(KeyProperties.ENCRYPTION_PADDING_NONE)
    .build());
keyGenerator.generateKey();

Android-Reports-and-Resources typically includes shorter code snippets or references:

// Android-Reports-and-Resources example
Intent intent = new Intent(Intent.ACTION_VIEW);
intent.setData(Uri.parse("content://settings/system"));
startActivity(intent);

Both repositories offer valuable resources for Android security, but MASTG provides a more comprehensive guide for secure development, while Android-Reports-and-Resources focuses on real-world vulnerabilities and tools.

4,274

The Leading Security Assessment Framework for Android.

Pros of drozer

  • Interactive command-line interface for real-time Android app testing
  • Supports dynamic analysis and runtime manipulation of Android apps
  • Provides a wide range of modules for various security assessments

Cons of drozer

  • Focused solely on Android, while MASTG covers both iOS and Android
  • Less comprehensive documentation compared to MASTG's extensive guide
  • Requires more technical expertise to use effectively

Code Comparison

MASTG (XML example for secure network configuration):

<network-security-config>
    <domain-config cleartextTrafficPermitted="false">
        <domain includeSubdomains="true">example.com</domain>
    </domain-config>
</network-security-config>

drozer (Python example for enumerating activities):

dz> run app.activity.info -a com.example.app
Package: com.example.app
  com.example.app.MainActivity
    Permission: null
  com.example.app.SettingsActivity
    Permission: null

While MASTG provides comprehensive guidelines and best practices for secure mobile app development, drozer offers a more hands-on approach to security testing. MASTG covers a broader range of topics and platforms, making it suitable for developers and security professionals alike. drozer, on the other hand, is a specialized tool for Android security testing, offering real-time interaction and dynamic analysis capabilities.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

OWASP Mobile Application Security Testing Guide (MASTG)

OWASP Flagship Creative Commons License

Document Build Markdown Linter URL Checker

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWASP Mobile Security Weakness Enumeration (MASWE) weaknesses, which are in alignment with the controls listed in the OWASP Mobile Application Verification Standard (MASVS).

OWASP MAS: OWASP MASVS ➡ OWASP MASWE ➡ OWASP MASTG




Trusted by

The OWASP MASVS, MASWE and MASTG are trusted by the following platform providers and standardization, governmental and educational institutions. Learn more.


🥇 MAS Advocates

MAS Advocates are industry adopters of the OWASP MASVS, MASWE and MASTG who have invested a significant and consistent amount of resources to push the project forward by providing consistent high-impact contributions and continuously spreading the word. Learn more.