Summary

This chapter has provided an overview of Android application attacks by explaining the common vulnerabilities listed in the OWASP mobile top 10 list. We have also been introduced to automated tools such as Drozer and QARK. Though it is a basic introduction to these tools in this chapter, we will explore more about them later in this book.

In the next chapter, we will discuss about insecure data storage vulnerabilities in Android apps.

Get Penetration Testing: A Survival Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.