Homepage
Open in app
Sign in
Get started
Mobile Penetration Testing
Android and iOS Penetration Testing
Android Penetration Testing Course
Follow
13. Insecure Input Validation — Part 3
13. Insecure Input Validation — Part 3
We cannot conclude Android penetration testing course without discussing native development issues. As you may already know, Stack Buffer…
Galilei
May 24, 2019
12. Hard Coding Issues — Part 2
12. Hard Coding Issues — Part 2
Hard coding sensitive data means welcoming hackers with a lovely implanted backdoor. To find such a vulnerability, we need to reverse…
Galilei
Apr 14, 2019
Access Control
Access Control
Android has a very complex architecture. It has built on Linux kernel, Dalvik Virtual Machine and much more. but it has four vital…
Galilei
Apr 6, 2019
Insecure Input Validation
Insecure Input Validation
Insecure input validation is one of the mistakes of careless developers. This is not a new issue. We see lots of development based…
Galilei
Mar 31, 2019
Android Penetration Testing Courses
Android Penetration Testing Courses
Step by step learning how to penetration test an android application and device.
Galilei
Mar 30, 2019
06. Insecure Data Storage — Part 4
06. Insecure Data Storage — Part 4
The final tutorial in storage issues, related to External Storage. As the android API describes External Storage may be a SD card or part…
Galilei
Mar 30, 2019
05. Insecure Data Storage — Part 3
05. Insecure Data Storage — Part 3
As we go on, some steps may become repetitive and boring, but I want to cover every step in the Android penetration testing in 0 to 100…
Galilei
Mar 29, 2019
About Mobile Penetration Testing
Latest Stories
Archive
About Medium
Terms
Privacy
Teams