Damn Insecure and Vulnerable Application – Part VI

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document related to deploying / using of Jadx. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device using […]

Damn Insecure and Vulnerable Application – Part V

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document on how to install Burp’s CA Certificate in an Android Device. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device […]

Damn Insecure and Vulnerable Application – Part II

In this post I would continue to discuss about the testing of “diva” application. Till now we have discussed about: Android Architecture Android Application Architecture Android device virtualization Connecting to the android device using android debug bridge Using shell commands on the device Installing android application using adb Knowing about the process which is executed when we click […]

Damn Insecure and Vulnerable Application – Walk-through

In this post I would be discussing about how to perform security testing on android application. And at the end of the post, a document is provided in which you would find the lab setup steps. Before understanding the security testing of android application, you must have a good understanding of the android platform & its architecture and the building blocks (components) of android […]