Skip to content
Navigation

Aditya Agrawal

Aditya Agrawal

Security Researcher. RailFan. Foodie

Posts navigation

Newer Posts
Oct 13thOctober 14, 2015

Android Application Security Part 19 – Improper Session Handling

Improper Session Handling holds 9th position in OWASP Mobile Top 10. Session handling is very important part after authentication has …

Oct 13thOctober 14, 2015

Android Application Security Part 18 – Attacking Broadcast Receivers

To get the list of exported Broadcast Receivers, you can either use drozer or can also look in AndroidManifest.xml file …

Oct 13thOctober 14, 2015

Android Application Security Part 17 – Attacking Activities

As i have defined in Android Application Security Part 3 – Android Application Fundamentals, an activity is a graphical user …

Oct 13thOctober 14, 2015

Android Application Security Part 16 – Attacking Services

I have already described about Content Providers in Android Application Security Part 3- Android Application Fundamentals, please go through it …

Oct 13thOctober 14, 2015

Android Application Security Part 15 – Attacking Content Providers

I have already described about Content Providers in Android Application Security Part 3- Android Application Fundamentals, please go through it …

Oct 13thOctober 14, 2015

Android Application Security Part 14 – Security Decisions via Untrusted Input

Security Decisions via Untrusted Inputs holds 8th position at OWASP Mobile Top 10. Your mobile application can accept data from …

Oct 13thOctober 14, 2015

Android Application Security Part 13 – Broken Cryptography

In this post i will be talking about Broken Cryptography. As per OWASP-Mobile Security Project Broken Cryptography is on the …

Oct 13thOctober 14, 2015

Android Application Security Part 12 – Poor Authentication And Authorization

Poor Authorization and Authentication hold 5th position in OWASP Mobile Security Top 10. In this post i will be demonstrating …

Oct 13thOctober 14, 2015

Android Application Security Part 11 – Unintended Data Leakage

Unintended Data Leakage holds 4th position at OWASP Mobile Top 10 As the name suggest “Unintended Data Leakage” means when …

Oct 13thOctober 14, 2015

Android Application Security Part 10 – Insufficient Transport Layer Protection

Insufficient Transport Layer Protection holds 3rd position at OWASP Mobile Top 10. Nearly all Android Applications transmit data between Client …

Posts navigation

More Posts
Close Drawer

Aditya Agrawal

  • Appie
  • Pentest Box
  • Android Security Series
  • IoT Security Wiki
  • Mobile Security Wiki
  • Blog Series
  • Hire Me
  • About
  • Twitter
  • Contact

Copyright 2016, Aditya Agrawal

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.