1. Introduction & Mobile Pentesting

Intro

The Penetration Testing Process

  • Reconnaissance Active/Passive

  • Scanning/Enumeration

  • Exploitation

  • Privilege Escalation / Maintaining Access / Lateral, Vertical movement

  • Covering the tracks

  • Reporting

The Mobile Application Penetration Testing Process

  • Reconnaissance

  • Static Analysis

  • Dynamic Analysis

  • Reporting

Mobile Penetration Testing

Reconnaissance

  • Info about the company Mobile Apps, releases, reports, code

  • Target app on the Play Store (Android) and App Store (iOS) for reviews, developers, versions, patches, company info, etc

Static Analysis

Read app's code manually and via automated tools. Look for:

  • security misconfigurations

  • hardcoded strings

  • user's information, email, username, passwords

  • URL - recon, enumerate, new exploitation path via API gateways

  • Cloud resources and storage buckets

  • Local Storage locations

  • etc

Dynamic Analysis

Run the application and manipulate it by:

  • intercepting traffic with proxies

  • dump (RAM) memory and check for stored secrets

  • break SSL Pinning

  • check for runtime created files on local storage

Check the OWASP MASTG for various mobile security tests. Some attacks can result in OWASP Top Ten related attack vectors (SQL injection, XSS, IDOR) on the full website.

Reporting

Executive summary and detailed technical analysis of specific vulnerabilities, including criticality assessment, scoring, steps for reproduction, and mentions of positive security implementations.


Last updated