Damn Insecure and Vulnerable Application – Part VI

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document related to deploying / using of Jadx. Till now we have discussed about the following things: Android PlatformAndroid ArchitectureAndroid Application ArchitectureAndroid device virtualisationConnecting to the android device using android debug bridgeUsing shell … Continue reading Damn Insecure and Vulnerable Application – Part VI

Damn Insecure and Vulnerable Application – Part V

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document on how to install Burp's CA Certificate in an Android Device. Till now we have discussed about the following things: Android PlatformAndroid ArchitectureAndroid Application ArchitectureAndroid device virtualisationConnecting to the android device using android debug bridgeUsing … Continue reading Damn Insecure and Vulnerable Application – Part V

Damn Insecure and Vulnerable Application – Part III

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. Till now we have discussed about the following things: Android PlatformAndroid ArchitectureAndroid Application ArchitectureAndroid device virtualizationConnecting to the android device using android debug bridgeUsing shell commands on the deviceInstalling android application using adbKnowing about the process which is executed … Continue reading Damn Insecure and Vulnerable Application – Part III

Damn Insecure and Vulnerable Application – Walk-through

In this post I would be discussing about how to perform security testing on android application. And at the end of the post, a document is provided in which you would find the lab setup steps. Before understanding the security testing of android application, you must have a good understanding of the android platform & its architecture and the building blocks (components) of android … Continue reading Damn Insecure and Vulnerable Application – Walk-through