Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
Go to file
Michael Herzberg 8c67567096 Adjusted plugin.xml for older Cordova versions. 2015-05-18 13:51:45 +02:00
DVHMA-Featherweight Uncluttered checkForExtraText. 2015-05-17 12:58:09 +02:00
DVHMA-OpenUI5 Fixed app name. 2015-05-13 22:47:51 +02:00
plugins Adjusted plugin.xml for older Cordova versions. 2015-05-18 13:51:45 +02:00
.gitignore Initial commit 2015-05-13 11:43:05 +02:00
LICENSE Initial commit 2015-05-13 11:43:05 +02:00
README.md Added installation instructions. 2015-05-13 22:08:46 +02:00

README.md

DVHMA

Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. Its purpose is to enable security professionals to test their tools and techniques legally, help developers better understand the common pitfalls in developing hybrid mobile apps securely.

Motivation and Scope

This app is developed to study pitfalls in developing hybrid apps, e.g., using Apache Cordova or SAP Kapsel, securely. Currently, the main focus is to develop a deeper understanding of injection vulnerabilities that exploit the JavaScript to Java bridge.

Installation

Prerequisites

We assume that the

Building DVHMA

Setting Environment Variables

export ANDROID_HOME=<Android SDK Installation Directory>
export PATH=$ANDROID_HOME/tools:$PATH
export PATH=$ANDROID_HOME/platform-tools:$PATH

Compiling DVHMA

cd DVHMA-Featherweight
cordova plugin add ../plugins/DVHMA-Storage
cordova plugin add ../plugins/DVHMA-WebIntent 
cordova compile android

Running DVHMA in an Emulator

cordova run android 

Team Members

This application is developed as part of the project ZertApps (Certified Security for Mobile Applications). ZertApps (http://www.zertapps.de) is a collaborative research project funded by the German Ministry for Research and Education. The core developers of DVHMA are:

License

This project is under the Apache 2.0 License.