GalileiinMobile Penetration Testing13. Insecure Input Validation — Part 3We cannot conclude Android penetration testing course without discussing native development issues. As you may already know, Stack Buffer…May 24, 2019May 24, 2019
GalileiinMobile Penetration Testing12. Hard Coding Issues — Part 2Hard coding sensitive data means welcoming hackers with a lovely implanted backdoor. To find such a vulnerability, we need to reverse…Apr 15, 2019Apr 15, 2019
GalileiinMobile Penetration TestingAccess ControlAndroid has a very complex architecture. It has built on Linux kernel, Dalvik Virtual Machine and much more. but it has four vital…Apr 6, 2019Apr 6, 2019
GalileiinMobile Penetration TestingInsecure Input ValidationInsecure input validation is one of the mistakes of careless developers. This is not a new issue. We see lots of development based…Mar 31, 2019Mar 31, 2019
GalileiinMobile Penetration TestingAndroid Penetration Testing CoursesStep by step learning how to penetration test an android application and device.Mar 31, 20191Mar 31, 20191
GalileiinMobile Penetration Testing06. Insecure Data Storage — Part 4The final tutorial in storage issues, related to External Storage. As the android API describes External Storage may be a SD card or part…Mar 30, 2019Mar 30, 2019
GalileiinMobile Penetration Testing05. Insecure Data Storage — Part 3As we go on, some steps may become repetitive and boring, but I want to cover every step in the Android penetration testing in 0 to 100…Mar 29, 2019Mar 29, 2019
GalileiinMobile Penetration Testing04. Insecure Data Storage — Part 2As we discussed earlier, storing sensitive data as a plain text is completely insecure. This is the second task that shows data leakage…Mar 26, 2019Mar 26, 2019
GalileiinMobile Penetration Testing03. Insecure Data Storage — Part 1Storing important data like password and credit card number needs a secure mechanism. Ordinarily, Developers use file, database or saved…Mar 26, 20191Mar 26, 20191
GalileiinMobile Penetration Testing02. Hard Coding IssuesThe second task in DIVA tries to teach hard coding sensitive data is vary dangerous. Because attackers can reverse engineer the…Mar 18, 2019Mar 18, 2019