Damn Insecure and Vulnerable Application – Part VI

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document related to deploying / using of Jadx. Till now we have discussed about the following things: Android PlatformAndroid ArchitectureAndroid Application ArchitectureAndroid device virtualisationConnecting to the android device using android debug bridgeUsing shell … Continue reading Damn Insecure and Vulnerable Application – Part VI

Damn Insecure and Vulnerable Application – Part V

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. In the end of the post you may find a document on how to install Burp's CA Certificate in an Android Device. Till now we have discussed about the following things: Android PlatformAndroid ArchitectureAndroid Application ArchitectureAndroid device virtualisationConnecting to the android device using android debug bridgeUsing … Continue reading Damn Insecure and Vulnerable Application – Part V

Damn Insecure and Vulnerable Application – Part III

In this post I would continue to solve the challenges that is in the vulnerable application “diva”. Till now we have discussed about the following things: Android PlatformAndroid ArchitectureAndroid Application ArchitectureAndroid device virtualizationConnecting to the android device using android debug bridgeUsing shell commands on the deviceInstalling android application using adbKnowing about the process which is executed … Continue reading Damn Insecure and Vulnerable Application – Part III

Damn Insecure and Vulnerable Application – Walk-through

In this post I would be discussing about how to perform security testing on android application. And at the end of the post, a document is provided in which you would find the lab setup steps. Make a one-time donationChoose an amount$1.00$2.00$5.00Or enter a custom amount$——Your contribution is appreciated.Donate Before understanding the security testing of android application, you must have a good … Continue reading Damn Insecure and Vulnerable Application – Walk-through