Useful Links
Computer Science
Cybersecurity
Android Security and Penetration Testing
1. Introduction to Android Security
2. Setting Up a Penetration Testing Environment
3. Static Analysis (SAST)
4. Dynamic Analysis (DAST)
5. Network Traffic Analysis
6. Common Android Vulnerabilities (OWASP Mobile Top 10)
7. Advanced Security Topics
8. Reporting and Mitigation
Common Android Vulnerabilities (OWASP Mobile Top 10)
M1: Improper Platform Usage
Misuse of Platform Features
Intent Misuse
Permission Abuse
Insecure Intent Usage
Implicit Intents
Intent Spoofing
Keychain Misuse
TouchID Misuse
M2: Insecure Data Storage
Unencrypted Storage
SQLite Databases
SharedPreferences
Internal Storage
Insecure External Storage Usage
SD Card Storage
Public Directories
Logging Sensitive Data
Keyboard Cache
Copy/Paste Buffer Leaks
M3: Insecure Communication
Lack of Transport Encryption
HTTP Usage
Unencrypted Protocols
Weak SSL/TLS Configuration
Deprecated Protocols
Weak Cipher Suites
Certificate Validation Issues
Mixed Content
M4: Insecure Authentication
Weak Authentication Mechanisms
Poor Password Policies
Weak Biometric Implementation
Credential Leakage
Hardcoded Credentials
Credential Storage Issues
Session Management Flaws
Broken Multi-factor Authentication
M5: Insufficient Cryptography
Use of Deprecated Algorithms
MD5 Usage
DES Usage
Poor Key Management
Hardcoded Keys
Weak Key Generation
Insecure Random Number Generation
Custom Cryptographic Implementations
M6: Insecure Authorization
Broken Access Controls
Privilege Escalation
Horizontal Privilege Escalation
Client-side Authorization
Insecure Direct Object References
Function Level Access Control Issues
M7: Client Code Quality
Code Injection Vulnerabilities
SQL Injection
Command Injection
Logic Flaws
Business Logic Bypass
Race Conditions
Memory Corruption Issues
Input Validation Failures
M8: Code Tampering
Lack of Integrity Checks
Missing Code Signing Verification
Runtime Application Self Protection (RASP) Absence
Tamper Detection Bypass
Binary Patching
Method Hooking
M9: Reverse Engineering
Lack of Obfuscation
Clear Text Code
Readable String Resources
Exposure of Sensitive Logic
Algorithm Disclosure
Business Logic Exposure
Debug Information Leakage
Symbol Table Exposure
M10: Extraneous Functionality
Debug Code in Production
Debug Flags
Test Endpoints
Unintended Backdoors
Hidden Functionality
Developer Backdoors
Unused Code Paths
Administrative Interfaces
Previous
5. Network Traffic Analysis
Go to top
Next
7. Advanced Security Topics