Verifying the Configuration of Cryptographic Standard Algorithmsĭetermining Whether Sensitive Data Is Exposed via IPC MechanismsĬhecking for Sensitive Data Disclosed Through the User Interface Testing Reverse Engineering Tools Detectionĭetermining Whether Sensitive Data Is Shared with Third Partiesįinding Sensitive Data in the Keyboard Cache Testing for Debugging Code and Verbose Error Logging Making Sure that the App is Properly Signed Make Sure That Free Security Features Are Activated Testing Local Storage for Input ValidationĬhecking for Weaknesses in Third Party Libraries Testing for Java Objects Exposed Through WebViews Testing for Vulnerable Implementation of PendingIntent Testing for Sensitive Functionality Exposure Through IPC Testing Custom Certificate Stores and Certificate Pinningĭetermining Whether Sensitive Stored Data Has Been Exposed via IPC MechanismsĬhecking for Sensitive Data Disclosure Through the User Interfaceįinding Sensitive Information in Auto-Generated Screenshots Testing the Configuration of Cryptographic Standard Algorithms Testing the Device-Access-Security Policy Mobile App Tampering and Reverse Engineeringĭetermining Whether Sensitive Data Is Shared with Third Parties via Embedded Servicesĭetermining Whether Sensitive Data Is Shared with Third Parties via Notificationsĭetermining Whether the Keyboard Cache Is Disabled for Text Input Fields Introduction to the OWASP Mobile Application Security Project
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |