Android Application Pentesting…

0 0
Read Time:52 Second



Hey guys in this Video I have covered the Basic Pentesting methodology for the Android application, OWASP Top 10 Categories and sample static analysis demo

Vulnerable Application :

Time Stamp:
——————–
00:00 – Introduction
02:00 – Pentesting Methodology
02:44 – Reconnaissance
05:41 – Static Analysis
10:18 – OWASP Top 10 Explained
11:00 – M1 Improper Platform Usage
13:14 – M2: Insecure Data Storage
14:16 – M3: Insecure Communication
15:09 – M4: Insecure Authentication
16:06 – M5: Insufficient Cryptography
17:00 – M6: Insecure Authorization
17:30 – M7: Client Code Quality
18:00 – M8: Code Tampering
18:53 – M9: Reverse Engineering
20:00 – M10: Extraneous Functionality
20:56 – Vulnerable App Installation
21:15 – Demo
31:06 – Static Analysis Demo

Tool Links
—————–
Android Platform Tool:
Java Download :
Jadx-GUI :
Emulator and Dynamic Tools Setup :

Note: For Emulator You can use any of the emulators like android studio default one, or Memu or Gennymotion According to your wish…..
My Preference is Android studio or memu..

source

This post was automatic generated with this wp-automatic-plugin

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
osCommerce: Version 4:  re-bui… Previous post osCommerce: Version 4: re-bui…
First look at Regular Labs Adv… Next post First look at Regular Labs Adv…

13 thoughts on “Android Application Pentesting…

Leave a Reply

Your email address will not be published.