Mobile Security

 

Mobile Security







Mobile Security  prerequisite






Table of Contents

1 Installation of Tools .......................................................................................................................3

2 Important Reference Links .........................................................................................................23

3 Mobile Application - Android App Test Cases ...........................................................................24

3.1 Android Debuggable Enabled .............................................................................................24

3.2 Application Backup is set to true........................................................................................25

3.3 Application creates cache....................................................................................................26

3.4 Exploitable Activity..............................................................................................................27

3.5 Insecure Data Storage..........................................................................................................29

3.6 Insecure Logging..................................................................................................................31

3.7 OPTIONS HTTP Method Enabled........................................................................................34

3.8 Root detection capability is missing...................................................................................35

3.9 Sensitive information (token) in URL ................................................................................36

3.10 SSL pinning not enabled......................................................................................................37

3.11 Application Certificate Protection is Missing / JAR File Unsigned ..................................38

3.12 Application is Not Signed / Unsigned Application............................................................39

3.13 SSL Pinning Bypass..............................................................................................................40

3.14 Root Detection Bypass.........................................................................................................43


Comments

Popular posts from this blog

ODD MAN OUT

NUMBER SERIES ,LETTERSERIES,NUMBER ANALOGIES , LETTERANALOGIES

Reference links