Penetration Testing - Mobile

Description

Security Footprint roleplays as malicious user or anonymous attacker targeting weaknesses and vulnerabilities within the target mobile application. Key objectives include gaining unauthorised access to application functionality, sensitive or secured information, protected mobile data storage, successful execution of client side attacks and successful attacks against the supporting systems and server-side application environment.

Security Footprint has based its testing methodology on industry recognised good practices for mobile application security controls such as The Open Web Application Security Project (OWASP). At a high level the security testing include the following methodology that target key security controls within mobile applications:

  • Weak server side controls
  • Insecure data storage
  • Insufficient transport layer protection
  • Unintended data leakage
  • Poor authorization and authentication
  • Broken cryptography
  • Client side injection
  • Security decisions via untrusted inputs
  • Improper session handling
  • Lack of binary protections
  • Services
  • Mobile