Phyo WaThone Win from Myanmar shared with us a guide to common Android application vulnerabilities.
Article type: Bug bounty practice
Article difficulty: ⭐⭐⭐
Chapter content preview ↓↓↓
- Summary Introduction
- SSL Pinning Bypass using Frida, Objection
- Insecure Storage for Sensitive Information
- Testing for Insecure Communication
- Finding for Hardcoded Information
- Testing Insecure Activities, Deep Links
- Firebase Database Takeover Addendum: Popular tools name for Android penetration testing
Everyone is welcome to learn and share: Beginner’s Guide: Basic Methods for Finding Android Application Vulnerabilities