Useful Links
Computer Science
Cybersecurity
Android Security and Penetration Testing
1. Introduction to Android Security
2. Setting Up a Penetration Testing Environment
3. Static Analysis (SAST)
4. Dynamic Analysis (DAST)
5. Network Traffic Analysis
6. Common Android Vulnerabilities (OWASP Mobile Top 10)
7. Advanced Security Topics
8. Reporting and Mitigation
Static Analysis (SAST)
Deconstructing the APK File
Understanding the APK Structure
AndroidManifest.xml
classes.dex
resources.arsc
res/ Folder
lib/ Folder
assets/ Folder
META-INF/ Folder
Extracting APK Contents
Using Unzip
Using APKTool
File System Analysis
Decompiling and Disassembling
Using APKTool for Disassembly
Smali Code Analysis
Resource Extraction
Rebuilding APKs
Converting DEX to JAR
Using dex2jar
Handling Multiple DEX Files
Decompiling JAR to Java Source
Using JADX
Using JD-GUI
Handling Obfuscated Code
Analyzing the Android Manifest
Identifying App Components
Activities
Exported Activities
Intent Filters
Services
Exported Services
Service Types
Broadcast Receivers
Exported Receivers
Intent Filters
Content Providers
Exported Providers
URI Patterns
Reviewing Permissions
Dangerous Permissions
Unused Permissions
Custom Permissions
Checking for Exported Components
Exported Attribute Analysis
Security Risks of Exported Components
Intent Filter Vulnerabilities
Identifying Hardcoded API Keys and Secrets
Manifest Inspection
Resource File Analysis
String Resource Examination
Analyzing URL Schemes
Custom Scheme Registration
Intent Filter Analysis
Deep Link Security
Source Code and Resource Analysis
Searching for Hardcoded Credentials and Sensitive Information
API Keys
Passwords
Endpoints
Database Credentials
Identifying Insecure Cryptographic Implementations
Weak Algorithms
Hardcoded Keys
Poor Key Management
Insecure Random Number Generation
Reviewing Native Libraries for Vulnerabilities
Buffer Overflows
Unsafe JNI Usage
Memory Corruption Issues
Checking for Debugging Code and Logs
Debug Flags
Logging Sensitive Data
Test Code in Production
Analyzing WebView Usage
JavaScript Enabled
File Access Settings
Mixed Content Handling
Automated Static Analysis
Using MobSF for Automated Scanning
Upload and Analysis Process
Configuration Options
Interpreting Automated Analysis Reports
Identifying False Positives
Prioritizing Findings
Understanding Severity Levels
Custom Rule Development
SAST Rule Creation
Pattern Matching
Integration with CI/CD Pipelines
Previous
2. Setting Up a Penetration Testing Environment
Go to top
Next
4. Dynamic Analysis (DAST)