Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

The Mobile Application Penetration Testing Methodology

published on 2021-08-12 14:12:26 UTC by Tashina
Content:

The Mobile Application Penetration Testing Methodology shifts its focus from conventional application security, according to which the threat primarily originates from internet.

A Mobile Application Penetration Testing Methodology focuses on file systems, client security, network security and hardware. Thus, it considers that end user has the device’s control.

Let’s have a brief overview of the four main stages of Mobile Application Penetration Testing Methodology.

1. Discovery

It requires the penetration tester to gather information essential for understanding events leading to mobile application exploitation. Hence, intelligence gathering is an important step of penetration testing. Moreover, discovering hidden indications that can expose any vulnerabilities can differ a successful test from an unsuccessful penetration test.

The discovery stage includes:

  • Open Source Intelligence – the penetration tester searches app information from the internet, through social networking websites, or search engines.
  • Platform Understanding – to develop threat modelling for the app, the pen tester needs to understand the mobile app platform. Thus, they take the company, the business case, stakeholders, and internal processes into account.
  • Server-Side vs Client-Side Scenarios –  a penetration tester should understand the application type, such as web, native or hybrid, and work on test cases.

2. Assessment

Assessment or analysis involves the pen tester to go through the source code to identify any potential weaknesses or entry points. This process is unique since the penetration tester has to check the apps while installing them.

Different assessment methods include:

  • Local File Analysis – Penetration tester checks local files in the file system to check for any violations.
  • Archive Analysis – pen tester extracts iOS and Android application installation packages. Then, they review them to see if there are any modifications.
  • Reverse Engineering – it involves converting compiled apps into readable code.

3. Exploitation

The penetration tester leverages the vulnerabilities they have discovered. Based on the information they have, they will launch their attack. Hence, a thorough intelligence gathering has higher chances of successful exploitation that leads to a successful penetration test.

During exploitation stage, the pen tester tries to exploit the vulnerabilities to gain important information and carry out malicious activities. Furthermore, they undergo privilege escalation in order to elevate privileged users for avoiding restrictions on their activity. Moreover, the penetration tester executes modules that permit to backdoor the device for performing access in future.

4. Reporting

The final stage of this methodology is reporting. It involves presenting all the issues to the management. Also, this is the stage that differentiates a penetration test from a real attack.

The Mobile Application Penetration Testing Methodology is vendor neutral and takes mobile characteristics into consideration. It helps to improve repeatability and transparency for mobile penetration testing.

Mobile Application Pen Test Quote

If you are looking for a mobile application pen test quote, Aardwolf security can fulfil your requirement. Get in touch today to find out more or use our interactive pen test quote form.

The post The Mobile Application Penetration Testing Methodology appeared first on Aardwolf Security.

Article: The Mobile Application Penetration Testing Methodology - published over 3 years ago.

https://aardwolfsecurity.com/the-mobile-application-penetration-testing-methodology/   
Published: 2021 08 12 14:12:26
Received: 2023 01 08 19:41:25
Feed: Latest Hacking News
Source: Latest Hacking News
Category: Cyber Security
Topic: Cyber Security
Views: 1

Custom HTML Block

Click to Open Code Editor