Android Application Penetration Testing Checklist

Android Application Penetration Testing Checklist

Description: This checklist will help security analyst/consultants to test their client's android application for security assessment.

Memory/Storage Analysis

 - Sensitive information disclosed in storage of the mobile device

 - Sensitive information found in logs

 - Sensitive information found in cache

 - Sensitive information found in installed application folder

 - Sensitive information stored in SQLite database in cleartext

 - Check if sensitive information remains there even after log out

 - Sensitive information stored in shared preference files

Code level vulnerabilities

 - Source code obfuscation not found

 - Sensitive information disclosed in application error message

 - Binary reverse engineering

 - Insecure permissions set by application through AndroidManifest.xml file

 - Weak hashing & encoding algorithms

 - Use Agnito to find security issues in application source code

Business logic vulnerability

 - User account compromise of another user

 - Admin account compromise from user account

 - Bruteforce authentication/otp/other services

 - Check for server side validation

 - Check for root detection method / bypass it

Transport layer security

 - Older version of SSL used

 - SSL pinning bypass

 - Weak ssl ciphers and other SSL related vulnerabilities (sslscan, sslyze, osaft etc.)

Server side checks

 - Check for SQL injection

 - CAPTCHA implementation flaws & bypass

  - Check for all HTTP methods (PUT, DELETE etc. Use burp intruder using HTTP verb tampering)

 - Check for client side injection (XSS)

 - Username enumeration

 - Other user's sensitive details enumeration

 - User detail's enumeration using IDOR

 - Malicious file upload

 - Server side flaws (IIS, APACHE, TOMCAT etc.)

 - Run nikto, dirb on web content URL

 - Check for session management (cookie flaws, session overriding, session fixation etc.)

Run Scanner

 - MobSF (Must Recommended)

For More articles like this, visit https://infosecninja.blogspot.com/

António Serafim Cassinda

Pentester | Offensive Security | CTF Player | Data Protection AO Student

3 年

Cool ??

回复
Anjali Gurjar

Immediate Joiner | Sr. Software Developer | Ex-HCL | Ex-Velocis | PLSQL | Postgresql | JavaScript | Node JS | Express JS | React | Mongodb

3 年

I have need help how to learn this

回复
sachin warad

CEH | OSWP | VAPT | AZ-900 | Security Engineer

3 年

good write up...

回复
Anggoro Basuki, CISM

Information Security Professional | Leadership | Business Continuity Enthusiast

7 年

Great checklist .. !! any chance that these checklist was put on live test ? I am interested how you would target a specific mobile device, most of them are clients that are less appealing than a server .. ?

Jayanta Karmakar

Sr. Specialist II - Product Security & Privacy at Philips Innovation Campus, Bangalore

7 年

That's a really good checklist! Thanks for sharing!

回复

要查看或添加评论,请登录

Chintan Gurjar的更多文章

社区洞察

其他会员也浏览了