Storing important data like password and credit card number needs a secure mechanism. Ordinarily…
As we go on, some steps may become repetitive and boring, but I want to cover every step in the…
The final tutorial in storage issues, related to External Storage. As the android API describes…
Hard coding sensitive data means welcoming hackers with a lovely implanted backdoor. To find such a…
We cannot conclude Android penetration testing course without discussing native development…
Android has a very complex architecture. It has built on Linux kernel, Dalvik Virtual Machine and much more. but it has four vital…
Logging is a method that developers use for tracing the code and watching warnings or errors. Unfortunately, Sometimes…
Everything starts with an introduction phase, I am not going to focus on this part much. but I’ll…
As we discussed earlier, storing sensitive data as a plain text is completely insecure. This is the…