We cannot conclude Android penetration testing course without discussing native development…
Hard coding sensitive data means welcoming hackers with a lovely implanted backdoor. To find such a…
Android has a very complex architecture. It has built on Linux kernel, Dalvik Virtual Machine and much more. but it has four vital…
Insecure input validation is one of the mistakes of careless developers. This is not a new issue. We see lots of…
The final tutorial in storage issues, related to External Storage. As the android API describes…
As we go on, some steps may become repetitive and boring, but I want to cover every step in the…
As we discussed earlier, storing sensitive data as a plain text is completely insecure. This is the…
Storing important data like password and credit card number needs a secure mechanism. Ordinarily…
The second task in DIVA tries to teach hard coding sensitive data is very dangerous. Because attackers…