Email the Author
You can use this page to email OWASP Foundation, Sven Schleier, Bernhard Mueller, Jeroen Willemsen, owasp, and Carlos Holguera about OWASP Mobile Application Security Testing Guide.
About the Book
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
The MASTG is the result of an open, crowd-sourced effort, made of the contributions of dozens of authors and reviewers from all over the world.
Note that the content in the Github repository will be updated with new content regularly and the e-book is not updated automatically. All funds raised through sales of this book go directly to OWASP and to fund production of future releases, including:
- Editing and proofreading by professional editors for new content of the Mobile Application Security Testing Guide (MASTG) and Mobile Application Security Verification Standard (MASVS)
- Graphic design and layout
Visit out GitHub repository for feedback, questions, or to contribute:
https://github.com/OWASP/owasp-mastg
About the Editors
Sven made several stops at big consultant companies and small boutique firms in Germany and Singapore and became specialised in Application Security and has supported and guided software development projects for Mobile and Web Applications during the whole SDLC. Besides his day job Sven is one of the core project leaders and authors of the OWASP Mobile Security Testing Guide and OWASP Mobile Application Security Verification Standard and has created the OWASP Mobile Hacking Playground. Sven is giving talks and workshops about Mobile and Web Application Security worldwide to different audiences, ranging from developers to students and penetration testers.
Bernhard is a cyber security specialist with a talent in hacking all kinds of systems. During more than a decade in the industry, he has published many zero-day exploits for products like MS SQL Server, Adobe Flash Player, IBM Director, Cisco VOIP and ModSecurity (at a time when vulnerabilities were still released for fun but without profit). If you can name it, he has probably broken it at least once. His pioneering work in mobile security was commended with a BlackHat "Best Research" Pwnie Award.
Jeroen Willemsen is a Principal Security Architect at Xebia. With a love for mobile security, he has been one of the projectleaders for the OMTG project (MASV & MSTG). Jeroen is more or less a jack of all trades with interest in infrastructure security, risk management and application security.
Carlos Holguera is a mobile security research engineer who has gained many years of hands-on experience in the field of security testing for mobile apps and embedded systems such as automotive control units and IoT devices. He is passionate about reverse engineering and dynamic instrumentation of mobile apps and is continuously learning and sharing his knowledge.