Mobile Apps Penetration Test
We find security weaknesses that impact the confidentiality, integrity, and availability of your mobile applications and recommend ways to remediate them in order of priority.
What we do
- For Android applications, we start by using the black box methodology, in which we don't have any information about the application. We aim to get a realistic view of the security level of the application and to identify all implementation errors and functional vulnerabilities.
- For iOS applications, we use the grey box methodology, in which we have access to a limited amount of information including the binary code and general information about the application. This allows us to be more time efficient as iOS apps take time to decrypt.
When to perform a Mobile App Penetration Test
If you want to:
- Validate the security of your iOS mobile application.
- Validate the security of your Android mobile application.
Put your defenses to the test
How we work
We lay bare any vulnerabilities or security misconfigurations that could have a detrimental impact on your systems' confidentiality, integrity, or availability.
1. Your needs
In the scoping meeting, our pentesters determine with your teams which assets you want to be tested as well as the budget, requirements, and planning. We then put together a project proposal and agree on a schedule for conducting the penetration test.
3. Penetration Test
4. Feedback Session
5. Deliverables
What we look for
Our experts enumerate all vulnerabilities within iOS or Android mobile apps including improper sensitive data storage, injections, binary compile issues, and many others.
On iOS applications, we look for:
- Issues in the IPA structure of the info. plist and the data paths
- Issues in the data storage and management: plist, core data, YapDatabase, SQL, firebase, realm, cache, cookies, snapshot, keychain
- Analysis of the application logs such as NSLog, NSAssert, NSCAssert
- Analysis of cryptography
On Android applications, we look for:
- URLs, API keys, tokens, and passwords gathering
- Static analysis of the manifest.xml and the resources.arsc
- Application permissions
- Code analysis and its inherent issues
- Shared library binary: NX, stack canary, RELRO, RPATH, run path, fortify, symbols stripped
- Trustability check
- Client-side injections
*Non-exhaustive lists. Full lists of tests available on-demand.
What you get
- A managerial report which summarizes the findings and their criticality for the management team to take decisions and prioritize corrections.
- A technical report which contains all the information about the findings, how to repeat the vulnerability, and recommendations on how to correct them.
- A secure environment after applying our recommendations.
Other on-demand services to help you manage your cyber risks
Remediation Follow-up
Bug Bounty Program
Source Code Review
Ready to test?
Get in touch with our ethical hackers to get a penetration testing offer tailored to your needs.