πŸ’₯
Android Penetration Testing
search
⌘Ctrlk
WEBSITEGITHUBLINKDININSTAGRAM
πŸ’₯
Android Penetration Testing
  • πŸ•΅οΈβ€β™‚οΈOWASP Mobile Top 10
  • "Let's Dive into the Theory"
  • 😍Theory of Android Penetration Testing
  • "Let's Dive into the Practical"
  • πŸ˜‡Vulnerable Android Application with Practical.
    • πŸ˜‰InsecureShop
      • 😁Vulnerability #1: Insecure Logging
      • πŸ˜‚Vulnerability #2: Hardcoded Credentials
      • πŸ˜†Vulnerability #3: Insecure Data Storage
      • 🀣Vulnerability #4: Lack of SSL Certificate Validation
      • 😍Vulnerability #5: Insufficient URL Validation
      • πŸ˜„Vulnerability #6: Weak Host Validation
      • 😘Vulnerability #7: AWS Cognito Misconfiguration
      • πŸ˜ƒVulnerability #8: Insecure Broadcast Receiver
      • πŸ˜›Vulnerability #9: Use of Implicit intent to send a broadcast with sensitive data
      • 😎Vulnerability #10: Using Components with Known Vulnerabilities
      • 😜Vulnerability #11: Intent Redirection (Access to Protected Components)
      • πŸ˜‚Vulnerability #12: Insecure Webview Properties Enabled
      • πŸ˜†Vulnerability #13: Intercepting Implicit intent to load arbitrary URL
      • πŸ™ƒVulnerability #14: Insecure Content Provider
      • πŸ₯°Reading Material
  • "Let's Dive into the Interview Questions"
  • 😎Important Interview Questions for Android Application Penetration Testing.
  • 😘Notes
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down
  1. πŸ˜‡Vulnerable Android Application with Practical.

πŸ˜‰InsecureShop

😁Vulnerability #1: Insecure Loggingchevron-rightπŸ˜‚Vulnerability #2: Hardcoded Credentialschevron-rightπŸ˜†Vulnerability #3: Insecure Data Storagechevron-right🀣Vulnerability #4: Lack of SSL Certificate Validationchevron-right😍Vulnerability #5: Insufficient URL Validationchevron-rightπŸ˜„Vulnerability #6: Weak Host Validationchevron-right😘Vulnerability #7: AWS Cognito Misconfigurationchevron-rightπŸ˜ƒVulnerability #8: Insecure Broadcast Receiverchevron-rightπŸ˜›Vulnerability #9: Use of Implicit intent to send a broadcast with sensitive datachevron-right😎Vulnerability #10: Using Components with Known Vulnerabilitieschevron-right😜Vulnerability #11: Intent Redirection (Access to Protected Components)chevron-rightπŸ˜‚Vulnerability #12: Insecure Webview Properties Enabledchevron-rightπŸ˜†Vulnerability #13: Intercepting Implicit intent to load arbitrary URLchevron-rightπŸ™ƒVulnerability #14: Insecure Content Providerchevron-rightπŸ₯°Reading Materialchevron-right
PreviousVulnerable Android Application with Practical.chevron-leftNextVulnerability #1: Insecure Loggingchevron-right