Android Checklist

Android Application Penetration Testing – Part 11 – Android Checklist

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some part of the platform correctly, therefore, could expose data, allow connections to untrusted hosts. With Android Application part 11,...
Mobile Application

Mobile Security Testing to Protect Your Applications From Cyber Threats

Owing to the sudden increase in the use of smartphones, tablets and other mobile devices, mobile application these days are proved as vital in increasing beneficiaries. These apps ensure a wider scope in the world of business and entertainment, and...
Android Penetration Testing

Android Application Penetration Testing – Part 10

Attacking Broadcast receiver: A Broadcast Receiver is an Android Component which allows you to register for system or application events.We recommend reading Android Penetration Testing – Part 5 for more details with Broadcast Receiver  Let’s examine android manifest Broadcast receivers are generally registered...
Android Application Penetration Testing

Android Application Penetration Testing – Part 9

In Last Part, Android Application Penetration Testing Part 8 We have seen about the Attacking through Content Provider when an app wants to share data with another app. Attacking through Android Pasteboard: Android provides the clipboard framework for copying and pasting different types of data....
Android Checklist

Android Application Penetration Testing – Part 8

In Last Part, Android Application Penetration Testing Part 7 We have seen about the Insecure external and internal storage and Insecure Communication. Attacking through Content Provider: We recommend reading content provider before starting is useful in cases when an app wants...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended