Android Security Checklist

Android Application Penetration Testing – Part 12

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some part of the platform correctly, therefore, could expose data, allow connections to untrusted hosts. With Android Application part 12,...
Android Penetration testing

Most Important Android Application Penetration Testing Checklist

Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended operating system in this viewpoint because of different reasons. However, as far...
bypass ssl

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA) can sign certificates for your domain, and not any CA in your browser store. Application developers implement Certificate pinning to...
Android Checklist

Android Application Penetration Testing – Part 11 – Android Checklist

Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some part of the platform correctly, therefore, could expose data, allow connections to untrusted hosts. With Android Application part 11,...
Android Application Penetration Testing

Android Application Penetration Testing – Part 7

In Last Part Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP 10. INSECURE LOGGING- ADB Logcat: Logcat is a command-line tool that dumps a log of system messages, including stack traces when the...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended