Android Application Security Part 26 – Intercept Traffic on Android version after 4.2.2
In this post i will demonstrate to intercept traffic after Android 4.2.2. Most of the android security professionals uses Cydia …
In this post i will demonstrate to intercept traffic after Android 4.2.2. Most of the android security professionals uses Cydia …
In this post i will demonstrate how you can install Google Play Store in a Genymotion Device. Switch ON your …
In the First Part of the series i have shown how we can configure a virtual device for pentesting. In …
Many a times you have seen that application which you want to assess is only allowed in selected countries, so …
There are sometimes when developer put a backdoor to a particular application. He/She puts that because he doesn’t want somebody …
Consider a situation when your mobile is stolen and it is not rooted. If an application is marked as debuggable …
Client Side Injections holds 7th position in OWASP Mobile Top 10 Javascript Injection: The mobile browser is vulnerable to javascript …
Improper Session Handling holds 9th position in OWASP Mobile Top 10. Session handling is very important part after authentication has …
To get the list of exported Broadcast Receivers, you can either use drozer or can also look in AndroidManifest.xml file …
As i have defined in Android Application Security Part 3 – Android Application Fundamentals, an activity is a graphical user …