Summary

In this chapter, we have learned about the different types of vulnerabilities that are merely a combination of implementation and coding mistakes. We learned about the OWASP mobile Top 10 vulnerabilities, ranging from insecure storage, binary patching, cryptographic flaws, and network flaws to different ways to circumvent the security controls that are put in place by Apple. We also looked at some serious mistakes that a developer can potentially make during the development of the app, leaving backdoor information hardcoded and the disclosure of algorithms and other app critical functions that can be exploited. We now know how to attack both Android and iOS apps in general, from basic to medium level to identify vulnerabilities. Developers ...

Get Mobile Application Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.