SeaCat Starter Pack (iOS)
Foreword
SeaCat starter pack is a distribution package, prepared to allow quick evaluation and understanding of how SeaCat product works. It is also a boilerplate for new mobile applications equipped with SeaCat.
The package consists of a simple iOS application, pre-integrated with SeaCat framework (SDK) and pre-configured gateway. Beside configuration, the gateway contains a simple CSR utility that allows the gateway to approve newly connected users either automatically or from the command-line.
SeaCat license is pre-installed in the starter pack.
Users can start building their mobile application based on the code in the starter pack or use it purely for evaluation or educational purposes.
To start with SeaCat starter pack, for those who have requested the pack, you should receive an email with download links. If this is not the case, please contact us at support@teskalabs.com.
( If you want a similar starter pack, please send an email to above address with "Request for SeaCat Starter Pack" in the subject line. We will follow up with you immediately. )
Instructions
- Download and unpack "SeaCat Gateway Starter pack" using the link from our email.
- Open 'Terminal' application and go to 'seacat' directory that has been created in previous step.
- Launch SeaCat gateway by './run.sh' script:
- Download and unpack "SeaCat iOS Starter pack" using the link from our email.
- Start Xcode and open the project file that has been unpacked in the previous step.
-
Run mobile application in iPhone simulator:
At this point, the mobile app waits for Certificate Signing Request approval at the gateway side.
This process is typically integrated with a backend of the mobile application. However, we will manually approve CSR using seacat-csr utility. -
Open a new session of 'Terminal' and go to the folder where you unpacked "SeaCat Gateway Starter pack".
- Run './csr.sh' command - you should be asked to approve one CSR, press 'y' + ENTER:
- Mobile application progresses to its main window and displays the result of HTTP call.
Gateway configuration
The initial gateway network location is set to localhost (127.0.0.1) port 7443 (TCP).
Please let us know if you want a different setup by sending an email to support@teskalabs.com, please don't forget to include your application bundle ID.
Configuration of SeaCat gateway can be found at seacat/etc/seacat.conf
There are two hosts pre-configured in SeaCat gateway:
- localhost.seacat points to http://localhost/
- evalhost.seacat points to http://eval.teskalabs.com/
Client certificates are stored in seacat/var/cert
directories.
You can freely investigate details of these certificates using standard tools. By physically removing the certificate file, you remove a given client (mobile app instance) from the whitelist, and this client will lose access to SeaCat gateway. In that case, the Seacat starter pack application will automatically generate and submit a new CSR.
License remarks
There are no limitations in terms of number of devices, users whatsoever. However, there is an expiration time set in evaluation license.
The license is bound to one specific application id (bundle id on Apple iOS platform).
The license can be used both in a simulator and on a real device.
Users are prohibited and unauthorized to resell or pass this license to third parties.
Reach out to us via email or follow us on Twitter @TeskaLabs for additional updates.
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles

A beginner-friendly intro to the Correlator for effective cybersecurity detection
At TeskaLabs, we know that a cybersecurity system is only as effective as its ability to detect threats. That's why we developed a powerful tool that will prove essential in your arsenal: the Correlator.
Published on March 15, 2024

Binary distributions of OpenSSL static libraries
The official source of OpenSSL software is the OpenSSL website. One can download OpenSSL source codes archives and compile them for a given platform. The compilation work can sometimes be quite tedious, especially for exotic platforms. We, at TeskaLabs, set up this page because we frequently compile OpenSSL for various platforms for our internal purposes and this may save some time to other developers.
development
android
windows
ios
security
Published on July 20, 2017

Log Management: Pre-implementation analysis
Pre-implementation analysis is a preparatory phase on the way to deploying a functional cybersecurity management system, i.e. TeskaLabs SIEM and security event management, Log Management. It is an integral and essential part of the entire implementation process, as it helps uncover any potential risks that may arise when deploying the mentioned SIEM and log management tools.
Published on September 15, 2022