πŸ’₯
Android Penetration Testing
search
⌘Ctrlk
WEBSITEGITHUBLINKDININSTAGRAM
πŸ’₯
Android Penetration Testing
  • πŸ•΅οΈβ€β™‚οΈOWASP Mobile Top 10
    • OWASP Mobile Top 10 2014
    • OWASP Mobile Top 10 2016
    • OWASP Mobile Top 10 2023
  • "Let's Dive into the Theory"
  • 😍Theory of Android Penetration Testing
  • "Let's Dive into the Practical"
  • πŸ˜‡Vulnerable Android Application with Practical.
  • "Let's Dive into the Interview Questions"
  • 😎Important Interview Questions for Android Application Penetration Testing.
  • 😘Notes
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ•΅οΈβ€β™‚οΈOWASP Mobile Top 10

OWASP Mobile Top 10 2016

Top 10 Mobile Risks - Final List 2016

  • M1: Improper Platform Usagearrow-up-right

  • M2: Insecure Data Storagearrow-up-right

  • M3: Insecure Communicationarrow-up-right

  • M4: Insecure Authenticationarrow-up-right

  • M5: Insufficient Cryptographyarrow-up-right

  • M6: Insecure Authorizationarrow-up-right

  • M7: Client Code Qualityarrow-up-right

  • M8: Code Tamperingarrow-up-right

  • M9: Reverse Engineeringarrow-up-right

  • M10: Extraneous Functionalityarrow-up-right

PreviousOWASP Mobile Top 10 2014chevron-leftNextOWASP Mobile Top 10 2023chevron-right

Last updated 2 years ago