Mobile Application Testing
Mobile application security assessment is the must do exercise to get an assessment of your applications to keep malicious users away from your infrastructure.
Mobile application security assessment is the must do exercise to get an assessment of your applications to keep malicious users away from your infrastructure.
Mobile applications are usually categorised in two areas, i.e., either web-based application that is responsive to mobile devices to offer compatible interfaces, or native mobile application developed for mobile devices only.
For the former, web application methodology is used to identify risks related to the application under review. If any web service endpoints are in use, these are also taken into consideration. In case of native mobile application, a different approach is taken due to the nature of installers, and the underlying development. Not only would mobile application testing be performed in this case, the mobile device would also be reviewed in order to attempt the retrieval of any residual data.
This information stored locally on the device is further checked for any encryption schemes implemented on the data or an assessment is performed further where this information can be used in conjunction with organisation's allowed scope of work.
We have a dedicated security assessments FAQ section. Read it here.
The mobile application security assessment is the must-do exercise to get an assessment of your applications to keep malicious users away from your infrastructure. Similarly, internal web applications are necessary to avoid leakage of information, unauthorized access to data, or to avoid potential damage by introducing insecure code.
Modern applications (including mobile) rely on API's for their features / functionalities. Once the API endpoints
We will analyse how the app behaves during run time in terms of data storage. The file storage mechanism would be analysed to ensure data retained on the device after the app is terminated is in line with best practices. Clear-text or data with weak encryption mechanism would be considered as a fail. The stored data will also be tampered to ensure no vulnerabilities exist when the app is relaunched
Reverse engineering a mobile app is the process of analyzing the compiled app to extract information about its source code. The goal of reverse engineering is to comprehend the code.
Authentication and authorization problems are prevalent security vulnerabilities. Most mobile apps implement user authentication. Even though part of the authentication and state management logic is performed by the back end service, authentication is such an integral part of most mobile app architectures that understanding its common implementations is important.
The mobile device will be configured to route its connection to the server using a local HTTP proxy. This will enable all the network traffic to be intercepted, viewed, and modified. It will also reveal the communication endpoints between the application and the server so that they can be tested. Network traffic that is not traversing the Web and is happening at a lower layer in the TCP/IP protocol stack, such as TCP and UDP packets, will also be intercepted and analysed.
Without executing the application, the mobile app binary is decompiled to understand the internal workings through its source code. During this testing, using our static code analysers, we identify vulnerabilities around the use of insecure libraries, functions that could lead to additional code-level vulnerabilities.
Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.
Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.
Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.