Damn Insecure and Vulnerable Application – Part VI

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document related to deploying / using of Jadx. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device using […]

Damn Insecure and Vulnerable Application – Part V

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document on how to install Burp’s CA Certificate in an Android Device. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualisation Connecting to the android device […]

Damn Insecure and Vulnerable Application – Part III

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. Till now we have discussed about the following things: Android Platform Android Architecture Android Application Architecture Android device virtualization Connecting to the android device using android debug bridge Using shell commands on the device Installing android application using adb […]

Damn Insecure and Vulnerable Application – Walk-through

In this post I would be discussing about how to perform security testing on android application. And at the end of the post, a document is provided in which you would find the lab setup steps. Before understanding the security testing of android application, you must have a good understanding of the android platform & its architecture and the building blocks (components) of android […]