Android Pentesting

Get Started. It's Free
or sign up with your email address
Android Pentesting by Mind Map: Android Pentesting

1. Weak Hashing & Encryption

2. apkcombo.com

3. Lab Setup

3.1. Rooted Device

3.2. Genymotion

3.3. Burp Suite

3.4. APKTool & Dex2Jar

3.5. Jadx-GUI

3.6. MobSF & Qark

3.7. Drozer

4. Application Installation

4.1. From PlayStore

4.2. ADB

5. iOS Security Model & Legacy Issue

5.1. Root Detection & Sandboxing

5.2. SSL Unpinning using Mallory

5.3. Use of Disabling certificate validation

6. Weak Cryptography

6.1. Poor key management process

6.2. Use of custom encryption protocols

6.2.1. Copy Paste Caching / Clipboard Leaking

7. Unintended Data Leakage

7.1. Logcat/ Logging

7.2. URL Caching (Both request and response)

7.3. GitHub

7.4. Keypress Caching & AutoCorrection Database

8. Insecure Data Storage

8.1. Android Directory Structure

8.2. In Sqlite Database

8.3. In shared_preference.xml

8.4. tmp directory

8.5. Source Code

8.6. Cache Directory

9. Reverse Engineering / Debugging

9.1. Unauthorized Code Modification

9.2. Insecure version of OS Installation Allowed

9.3. Code Obfuscation

10. IPC / Components Exploitation

10.1. Exploit Exported Activity

10.2. Exploit Broadcast Receiver

10.3. Scheme

10.3.1. Custom Scheme

10.3.2. Universal Link

10.4. Exploit Content Provider

10.5. Misconfig Intent & Intent Filter

11. Web-Based Exploitation

11.1. Abuse WebView

11.2. JS Enable Functionality

12. Runtime / Dynamic Analysis

12.1. Client/Server Side Attack

12.1.1. Sql Injection

12.1.2. Cross-site Scripting

12.1.3. Prediction Injection

12.1.4. XML Injection

12.2. Application Level DOS

12.3. Broken Authentication & Session Management

12.3.1. Session Terminating after Password Reset

12.3.2. Expired Token can be reused

12.3.3. Authentication Bypass using Success Response

12.3.4. OAuth Flow & 2FA Bypass

12.3.5. Cleartext Tranmission

12.4. Broken Access Control (BAC)

12.4.1. SSRF

12.4.2. Prev Escalation & IDOR

12.4.3. Unauthorized API Call