Summary

In this chapter, we assessed different aspects of Android applications. We saw different types of vulnerabilities in application permissions, components (activities, services, content providers, and broadcast receivers), WebViews, broken cryptography, local SQL injection, lack of binary protection, and other misconfigurations that could be potentially exploited by cyber attackers. We also discussed some of the deadly sins that developers make during the development, such as hardcoding passwords with backdoors. Every aspect that we assessed could potentially be used by developers to find vulnerabilities using the tools that we used in this chapter. We also learned about potential entry points that cyber attackers could use in order to gain ...

Get Mobile Application Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.