πŸ’₯
Android Penetration Testing
Ctrlk
WEBSITEGITHUBLINKDININSTAGRAM
  • πŸ•΅οΈβ€β™‚οΈOWASP Mobile Top 10
  • "Let's Dive into the Theory"
  • 😍Theory of Android Penetration Testing
  • "Let's Dive into the Practical"
  • πŸ˜‡Vulnerable Android Application with Practical.
    • πŸ˜‰InsecureShop
      • 😁Vulnerability #1: Insecure Logging
      • πŸ˜‚Vulnerability #2: Hardcoded Credentials
      • πŸ˜†Vulnerability #3: Insecure Data Storage
      • 🀣Vulnerability #4: Lack of SSL Certificate Validation
      • 😍Vulnerability #5: Insufficient URL Validation
      • πŸ˜„Vulnerability #6: Weak Host Validation
      • 😘Vulnerability #7: AWS Cognito Misconfiguration
      • πŸ˜ƒVulnerability #8: Insecure Broadcast Receiver
      • πŸ˜›Vulnerability #9: Use of Implicit intent to send a broadcast with sensitive data
      • 😎Vulnerability #10: Using Components with Known Vulnerabilities
      • 😜Vulnerability #11: Intent Redirection (Access to Protected Components)
      • πŸ˜‚Vulnerability #12: Insecure Webview Properties Enabled
      • πŸ˜†Vulnerability #13: Intercepting Implicit intent to load arbitrary URL
      • πŸ™ƒVulnerability #14: Insecure Content Provider
      • πŸ₯°Reading Material
  • "Let's Dive into the Interview Questions"
  • 😎Important Interview Questions for Android Application Penetration Testing.
  • 😘Notes
Powered by GitBook
On this page
  1. πŸ˜‡Vulnerable Android Application with Practical.
  2. πŸ˜‰InsecureShop

πŸ₯°Reading Material

  • https://developer.android.com/guide/components/intents-filters#Building

  • https://blog.oversecured.com/Interception-of-Android-implicit-intents/

  • https://labs.integrity.pt/articles/review-android-webviews-fileaccess-attack-vectors/index.html

PreviousVulnerability #14: Insecure Content ProviderNext"Let's Dive into the Interview Questions"

Last updated 2 years ago