These attacks are mostly caused by incorrect security configurations made by application developers. The attacker is not concerned with the resources the app communicates in order to carry out such attacks. It only tries to exploit the associated vulnerabilities on the device on which the application is installed.
Examples for Client-side Attacks
These weaknesses are caused by the application service communicates. In this way, the attacker can bypass authorization, disclose critical information, and identify users defined on your system. He can go a little further and use these weaknesses to access your server.
Mobile application security tests are performed in two phases;
Tests for Mobile Applications
The purpose of mobile application tests are to detect threats on the application. In this context, the following tests are performed based on OWASP TOP 10, together with the test user profiles including the scope.
Android and IOS Applications
In this phase, the following steps are carried out on the application.
In this phase, the following steps are carried out on the application.
- (Android)SQLite databases, “.db”
- (Android)Preferences, “.xml”
- (IOS)SQLite databases, ‘.db’
- (IOS)Binary property lsit files, ‘.plist’
- (IOS)Application files, ‘.app/’
- Application logs are reviewed to find out sensitive information.
- The web services which the application communicates are identified and all methodology applied to a web application (OWASP TOP 10) are implemented in the vulnerability scanning phase.