πŸ’₯
Android Penetration Testing
Ctrlk
WEBSITEGITHUBLINKDININSTAGRAM
  • πŸ•΅οΈβ€β™‚οΈOWASP Mobile Top 10
    • OWASP Mobile Top 10 2014
    • OWASP Mobile Top 10 2016
    • OWASP Mobile Top 10 2023
  • "Let's Dive into the Theory"
  • 😍Theory of Android Penetration Testing
  • "Let's Dive into the Practical"
  • πŸ˜‡Vulnerable Android Application with Practical.
  • "Let's Dive into the Interview Questions"
  • 😎Important Interview Questions for Android Application Penetration Testing.
  • 😘Notes
Powered by GitBook
On this page
  1. πŸ•΅οΈβ€β™‚οΈOWASP Mobile Top 10

OWASP Mobile Top 10 2016

Top 10 Mobile Risks - Final List 2016

  • M1: Improper Platform Usage

  • M2: Insecure Data Storage

  • M3: Insecure Communication

  • M4: Insecure Authentication

  • M5: Insufficient Cryptography

  • M6: Insecure Authorization

  • M7: Client Code Quality

  • M8: Code Tampering

  • M9: Reverse Engineering

  • M10: Extraneous Functionality

PreviousOWASP Mobile Top 10 2014NextOWASP Mobile Top 10 2023

Last updated 2 years ago