Code Monkey home page Code Monkey logo

ibugbazaar's Introduction

iBugBazaar: Your mobile appsec playground to Explore, Exploit, Excel

Welcome to iBugBazaar, your gateway to mastering Mobile penetration testing on iOS platform!

📱What is it?

iBugBazaar is a comprehensive mobile application intentionally designed to be vulnerable, featuring over 20+ vulnerabilities. Developed to emulate real-world scenarios, it includes more than 10 modules and features, each replicating real-world functions and the vulnerabilities surrounding them.

🔍Why?

We've bundled 20+ vulnerabilities into a single application, saving you from downloading multiple apps to learn about mobile application pentesting. We've packed a lot into one.

meme

🎯For whom?

Whether you're a security enthusiast, developer, beginner exploring the mobile pentesting arena, or a professional looking to hone your skills, iBugBazaar has something for everyone on the mobile pentesting learning curve.  

🤔What's in for me?

iBugBazaar offers a wide range of vulnerabilities, from  Arbitrary webview exploitation, authentication bypass, Patching the app binary and limit bypass, Runtime Manipulation — we've got a lot of things covered.  

🤓Never-Ending Learning

What's more exciting? Stay in sync with the evolving landscape! BugBazaar regularly updates with fresh vulnerabilities and captivating challenges. Stay vigilant, stay ahead! Get Started Today!

📷Screenshots

Untitled (1715 x 1080 px) (1)

⚠️Vulnerabilities

  1. API Key Storage: Storing API keys in Plist files.
  2. Sensitive Data Storage: Saving information in NSUserDefaults.
  3. Shopping Cart Bypass: Attempting to surpass product limits by modifying the app binary.
  4. Clipboard Data Exposure: Potential data exposure through copy-paste buffer caching.
  5. Insecure Logging during Card Addition: Logging sensitive information insecurely during card addition.
  6. Local Card Data Storage: Saving card data locally.
  7. Authentication Token Exposure: Allowing users to locally store authentication tokens after logout.
  8. Hardcoded Login Credentials: Embedding username and password in code during login.
  9. Login Rate Limiting: Potential vulnerability to rate limiting during login.
  10. Insecure Login Logging: Logging sensitive information insecurely during login.
  11. Hardcoded One-Time Password (OTP): Embedding OTP values directly in the code.
  12. Runtime Balance Tampering: Attempting to tamper with the balance during runtime.
  13. Background Screenshots: Unauthorised capture of screenshots in the background.
  14. WebView Redirection: Unauthorised redirection in web views.
  15. HTML Injection and XSS: Vulnerabilities related to HTML injection and cross-site scripting.
  16. Link File Theft via Schema: Unauthorised access to files through schema links.
  17. HiddenLabelView: Potential security risks associated with the HiddenLabelView.
  18. Insecure HTTP Requests: Performing HTTP requests without proper security measures.
  19. Vulnerable Functions: Presence of functions with potential security vulnerabilities.
  20. Allowing All URL Redirections: Lack of restriction on URL redirections.
  21. Jailbreak Detection Bypass: Potential methods to bypass jailbreak detection.
  22. Application Debuggable: Enabled for debugging, exposing potential security risks.
  23. Improper Input Validation: Lack of proper validation for user inputs, posing security vulnerabilities.

🔒Security Controls

Implemented security Controls including jailbreak detection and hooking detection with difficulty levels. Users can test their skills according to the selected security control level

  • EASY
  • MEDIUM
  • ADVANCED

Core Team

Kapil Gurav Security Consultant at Payatu- Mobile GitHub Twitter LinkedIn
Amit Kumar Prajapat Lead Security Consultant at Payatu- Mobile GitHub LinkedIn Twitter

ibugbazaar's People

Contributors

banditamit avatar banditaparna avatar banditkapil avatar hackersden09 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

ibugbazaar's Issues

installation issue

I install this IPA in iPhone but show error. my Device iOS Version:-(16.6) & Device Model iPhone 8 Plus.

2023-12-18_10h43_02
IMG_20231218_104242

UI ISSUE

hi, @banditkapil The login button on the login screen sometimes functions correctly and sometimes does not.

Tested on IOS 17.0

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.