Ethredix Ethredix
CS

Mobile Application Penetration Testing

Comprehensive security testing of mobile applications for Android and iOS according to OWASP MASTG and MASVS standards.

OWASP MASTG

Mobile Application Security Testing Guide - complete methodology for mobile app testing.

OWASP MASVS

Mobile Application Security Verification Standard - security verification standard for mobile apps.

Platform Specific

Testing platform-specific vulnerabilities according to Android and iOS security guidelines.

OWASP Mobile Top 10

Most common mobile application vulnerabilities

M1 – Improper Platform Usage

Misuse of platform-specific features or failure to use platform security controls properly.

TouchID bypass, Keychain misuse, Android permissions abuse

M2 – Insecure Data Storage

Sensitive data stored without encryption in local storage, databases or cache.

Unencrypted SQLite, SharedPreferences, NSUserDefaults

M3 – Insecure Communication

Insufficient network communication security, weak TLS configurations or missing certificate pinning.

HTTP instead of HTTPS, weak ciphers, missing SSL pinning

M4 – Insecure Authentication

Weak authentication mechanisms, improper session management or absence of biometric authentication.

Weak passwords, persistent tokens, missing MFA

M5 – Insufficient Cryptography

Use of weak cryptographic algorithms or improper encryption implementation.

Hardcoded keys, MD5/SHA1, ECB mode

M6 – Insecure Authorization

Insufficient permission checks on client-side or easily bypassed authorization.

Client-side access control, role confusion

M7 – Client Code Quality

Vulnerabilities caused by poor code quality such as buffer overflows or memory leaks.

Buffer overflow, use-after-free, format string

M8 – Code Tampering

Lack of protection against application modification, repackaging or runtime manipulation.

Missing root/jailbreak detection, repackaging

M9 – Reverse Engineering

Absence of code obfuscation and anti-debugging mechanisms facilitates application analysis.

Missing obfuscation, hardcoded secrets, debug symbols

M10 – Extraneous Functionality

Leftover debug functions, test accounts or hidden backdoors in production version.

Debug logs, test endpoints, admin panels

Testing Areas

🤖 Android Specific

  • → AndroidManifest.xml analysis
  • → Intent filtering and deeplinks
  • → Content Providers security
  • → Broadcast Receivers
  • → ProGuard/R8 obfuscation
  • → Root detection bypass

🍎 iOS Specific

  • → Info.plist configuration
  • → Keychain usage
  • → App Transport Security
  • → Universal Links
  • → Code signing
  • → Jailbreak detection bypass

Static Analysis

Decompilation, source code review, hardcoded secrets, insecure libraries.

Dynamic Analysis

Runtime hooking, API interception, memory dumps, SSL pinning bypass.

Network Analysis

Man-in-the-middle testing, certificate validation, API security.

Testing Output

Management Summary

Executive overview with risk profile, MASVS compliance score and business impact.

Technical Findings

  • → Source code location
  • → CVSS v3.1 score
  • → Reproduction steps
  • → Video PoC

MASVS Compliance

Detailed mapping of findings to MASVS controls with compliance report.

Remediation Guide

  • → Platform-specific fixes
  • → Code snippets
  • → Library recommendations

Process

01

Preparation and Scoping

Scope definition, obtaining APK/IPA, test environment setup.

02

Static Analysis

Decompilation, source code review, manifest analysis, dependency check.

03

Dynamic Analysis

Runtime testing, Frida hooking, SSL pinning bypass, memory dumps.

04

Network Analysis

MITM testing, API fuzzing, certificate validation testing.

05

Reporting

Report compilation with MASVS compliance, findings and remediation recommendations.