Mobile Security
Mobile Security
Table of Contents
1 Installation of Tools
.......................................................................................................................3
2 Important Reference Links
.........................................................................................................23
3 Mobile Application - Android App Test Cases
...........................................................................24
3.1 Android Debuggable Enabled
.............................................................................................24
3.2 Application Backup is set to
true........................................................................................25
3.3 Application creates
cache....................................................................................................26
3.4 Exploitable
Activity..............................................................................................................27
3.5 Insecure Data
Storage..........................................................................................................29
3.6 Insecure
Logging..................................................................................................................31
3.7 OPTIONS HTTP Method
Enabled........................................................................................34
3.8 Root detection capability is
missing...................................................................................35
3.9 Sensitive information (token) in URL
................................................................................36
3.10 SSL pinning not
enabled......................................................................................................37
3.11 Application Certificate Protection is Missing / JAR
File Unsigned ..................................38
3.12 Application is Not Signed / Unsigned
Application............................................................39
3.13 SSL Pinning
Bypass..............................................................................................................40
3.14 Root Detection Bypass.........................................................................................................43
Comments
Post a Comment