Useful Links
Computer Science
Cybersecurity
Security Testing
1. Foundations of Security Testing
2. Security Testing Methodologies
3. Types of Security Assessments
4. Penetration Testing Execution Standard
5. Web Application Security Testing
6. Mobile Application Security Testing
7. Infrastructure Security Testing
8. Security Testing Tools and Environments
9. Reporting, Remediation, and Verification
10. DevSecOps Integration
Mobile Application Security Testing
Mobile Platform Security
Android Security Architecture
Application Sandbox
Permission Model
Inter-Process Communication
Keystore System
iOS Security Architecture
App Store Review Process
Code Signing
Keychain Services
App Transport Security
OWASP Mobile Top 10
Improper Platform Usage
Misuse of Platform Features
Violation of Published Guidelines
Unintended Data Leakage
Insecure Data Storage
Local Database Security
File System Storage
Cloud Storage Issues
Insecure Communication
Network Protocol Weaknesses
Certificate Validation Issues
Man-in-the-Middle Vulnerabilities
Insecure Authentication
Weak Authentication Schemes
Biometric Authentication Bypass
Token-Based Authentication Flaws
Insufficient Cryptography
Weak Encryption Algorithms
Poor Key Management
Custom Cryptographic Implementations
Insecure Authorization
Privilege Escalation
Function-Level Access Control
Resource-Based Authorization
Client Code Quality
Buffer Overflows
Format String Vulnerabilities
Memory Management Issues
Code Tampering
Runtime Manipulation
Binary Patching
Method Hooking
Reverse Engineering
Static Analysis Resistance
Dynamic Analysis Protection
Anti-Debugging Techniques
Extraneous Functionality
Hidden Backdoors
Development Features
Debug Code
Mobile Testing Techniques
Static Analysis Methods
APK Decompilation
IPA Analysis
Source Code Review
Binary Analysis
Dynamic Analysis Approaches
Runtime Application Self-Protection Testing
Instrumentation Framework Usage
Method Tracing
Memory Dump Analysis
Network Traffic Analysis
Proxy Configuration
Certificate Pinning Bypass
Protocol Analysis
Encrypted Traffic Inspection
Device and Emulator Testing
Physical Device Testing
Emulator Limitations
Rooted/Jailbroken Device Testing
Permission and Privilege Analysis
Manifest File Review
Runtime Permission Testing
Privilege Escalation Testing
Previous
5. Web Application Security Testing
Go to top
Next
7. Infrastructure Security Testing