Android Application Security Testing Part-9: Android Application Security Testing [VAPT]
Android Application Vulnerability Assessment and Penetration Testing [VAPT]:
Structure of
Security Testing
1)
Preparation
·
Defining the scope of security testing,
including identifying applicable security controls, the organization's testing
goals, and sensitive data. More generally, preparation includes all
synchronization with the client as well as legally protecting the tester (who
is often a third party). Remember, attacking a system without written
authorization is illegal in many parts of the world
2)
Intelligence Gathering
·
Analysing the Environmental and Architectural context
of the app to gain a general contextual understanding.
o
Environmental Analysis
§ Focus on the
company behind the app and their business case and the relating
stakeholders
§ Analyse
internal processes and structures
o
Architectural Analysis
§ App (network
interfaces, used data, communication with other resources, session
management, jailbreak/rooting detection, …)
§ Runtime
environment (MDM, jailbreak/rooting, os version)
§ Backend
services (application server, databases, firewall, …)
3)
Vulnerability Assessment
·
Vulnerability analysis is usually the
process of looking for vulnerabilities in an app. Although this may be done
manually, automated scanners are usually used to identify the main
vulnerabilities.
·
Types of Vulnerability Analysis:
1.
Static Application Security Testing
[SAST]
§ During
static analysis, the mobile app's source code is analyzed to ensure appropriate
implementation of security controls. In most cases, a hybrid automatic/manual
approach is used
2.
Dynamic Application Security Testing
[DAST]
§ The focus of
dynamic analysis is the testing and evaluation of apps via their real-time
execution
3.
Forensic Analysis
§ In Forensic
Analysis we will test data storage in the device
·
Avoiding False Positives
Automated
testing tools' lack of sensitivity to app context is a challenge. These tools
may identify a potential issue that's irrelevant. Such results are called
"false positives."
4)
Exploitation
·
In this phase, the security tester
tries to penetrate the app by exploiting the vulnerabilities identified during
the previous phase. This phase is necessary for determining whether
vulnerabilities are real (i.e., true positives).
5)
Reporting
·
In this phase, which is essential to
the client, the security tester reports the vulnerabilities he or she has been
able to exploit and documents the kind of compromise he or she has been able to
perform, including the compromise's scope (for example, the data he or she has
been able to access illegitimately).
Useful
Links:
Thank you. I just wanted to know where to ship it since I know now to keep producing it
ReplyDeletevapt testing
Hey Nice blog keep it! up, your blog is very helpful for every person to learn software testing & Thanks for such a knowledgeable post.
ReplyDeleteSoftware Testing Services
Software Testing Services in USA
Software Testing Companies in USA
Software Testing Company
Software Testing Services Company
QA Testing Companies in USA
Software Testing Services in India
Software Testing Companies in India
Thanks for give me this information really this product is very effective.
ReplyDeletevapt singapore
The information on this blog is very useful and very interesting. Thank You.
ReplyDeleteISO Certification
Hello I am so delighted I located your blog, I really located you by mistake, while I was watching on google for something else, Anyways I am here now and could just like to say thank for a tremendous post and a all round entertaining website. Please do keep up the great work. download for pc
ReplyDeleteYou make so many great points here that I read your article a couple of times. Your views are in accordance with my own for the most part. This is great content for your readers. https://techbomb.net/
ReplyDeleteWonderful blog about Software Testing Services in Chennai to read and further more tips on the Software Testing Services in India have been learnt. It's great time spending on this. I am waiting for new post here about Software Testing Companies in Bangalore and Please keep it up in future..
ReplyDeleteConsult today to - Software Testing Services in Mumbai
Thankyou so much for wonderful information …great work…well done…keep doing…Looking for the best mobile application penetration testing services in Hyderabad contact Cyanous software solutions now.
ReplyDeleteBest web designing services in Hyderabad
Best software & web development company in Hyderabad
what ever the information you describing really its very nice,this blog contains sufficient information. TO Know more About VAPT Testing Services in Chennai
ReplyDeletegreat blog. Really love your content
ReplyDeleteMobile Application Penetration Testing Service
Thank you for sharing such a great content with us. Penetration testing is a systematic evaluation of security measures in an IT infrastructure. Waiting for more content about penetration testing services.
ReplyDelete