Demystifying Mobile App Pen Testing | Honor Tech

Curiosity in cellular app pen testing grows as organizations acknowledge the significance of mitigating safety and privateness dangers. Much less understood and extra mysterious to many, although, is the best way to construct the abilities wanted to conduct guide cellular software safety testing.

To make clear the subject, NowSecure convened a digital panel of its knowledgeable cellular pen testers on the NowSecure Join 2022 AppSec and DevSecOps neighborhood occasion. The NowSecure Companies crew has greater than a dozen years pen testing greater than 11,000 cellular apps in opposition to trade requirements and boasts the trade’s broadest assortment of essentially the most expert pen testers. As well as, NowSecure safety analysts have helped 1000’s of organizations set up profitable cellular app pen testing packages.

The panelists embody:

  • Ben Corbitt, Software Safety Analyst, NowSecure
  • David Mockler, Senior Software Safety Analyst
  • Jeremy Murphy, Senior Software Safety Analyst, NowSecure
  • Devin Worth, Lead Software Safety Analyst, NowSecure

The group dialogue highlights how cellular app pen testers obtained their begin and honed their craft, their favourite instruments for Android and iOS and finest practices for cellular app pen testing. Their unique dialog has been edited for size and readability.

[Mockler] Do you want certification or formal training to turn out to be a cellular pen tester or break into cybersecurity?

[Murphy] “No. There are many free and cheap assets on the market that may educate you all the pieces it is advisable to turn out to be a penetration tester. To get employed, although, certifications give potential employers a method to validate your skillset.”

[Corbitt] “They’re not essentially required, however are nice for constructing your resume and getting your foot within the door. Certifications that embody a coaching class like a weeklong boot camp or lab necessities will be actually useful in forcing you to be taught lots in a brief time frame.”

[Price] “I might say no. I’ve seen folks be a part of bug bounties or do technical write-ups to display to employers they know the best way to discover safety vulnerabilities inside cellular purposes.”

[Murphy] “Have a GitHub of a few of your work, a weblog or HackTheBox rank to indicate you’ve the abilities.”

[Mockler] How did every of you achieve pen testing abilities to get to the place you’re right this moment? 

[Price] “The most effective useful resource I used first was the extra senior pen testers already on my crew after I joined NowSecure. Early on, I appeared by older stories of what my teammates had achieved to get within the mindset of the best way to write an in depth evaluation report. In my free time, I accomplished pen testing coaching programs on TryHackMe and located some safety podcasts to assist me perceive the exploits pen testers are doing and perceive the vernacular.” 

[Corbitt] “I began as a pen tester for net apps. The corporate additionally had a cellular app and no person on the time knew the best way to check it. I used to be voluntold to get a cellular safety certification and check the app.”

[Murphy] “I began on the assist desk. One in all my coworkers mentioned, ‘Hey dude, you need to research for Licensed Moral Hacker (CEH). He advised me what it was and I assumed it was cool. Then I discovered a podcast that lit a fireplace beneath me — shoutout to Jack Rhysider at Darknet Diaries. It actually constructed my ardour for this subject. I began on Hack The Field and constructed a community of pen testers. I began within the trenches and labored my means up.”

[Mockler] “Everybody will get there in their very own means, however you all took the initiative to exit and be taught one thing new with out anybody actually telling you to. Curiosity is essential to being a pen tester. If you happen to don’t have curiosity, it’s going to be robust.”

[Mockler] Rolling into our subsequent query, what sort of cellular app pen testing instruments do you employ?

[Price] “For Android, my go-to instrument for any kind of static evaluation or reverse engineering is JADX, a easy Dex to Java decompiler. And for the iOS counterpart, I take advantage of Hopper which is a good disassembler that permits you to decompile and debug iOS purposes.”

[Corbitt] “I actually like Drozer, a instrument for Android apps. It’s very outdated and laborious to get working generally. I actually want there was a extra trendy supported instrument that does the identical factor. But it surely’s an excellent instrument for shortly and simply interacting with the internals of an software.”

[Murphy] “The right reply is NowSecure Workstation. Among the key ones are Hopper, Ghidra, Burp Suite, Postman, JADX…reFlutter on GitHub is one other good one for poking round these new Flutter apps. Clearly, R2Frida is one other good one we use lots for reverse engineering.”

[Mockler] “We get requested fairly a bit what are the most effective cellular app pen testing instruments on the market. It’s not essentially what the most effective instruments are — it’s ‘what are you attempting to do?’ Relying on what kind of exploit you’re going to strive, you’re going to make use of a distinct instrument and there’s a GitHub repo for all the pieces.”

[Mockler] We’ve mentioned what instruments we use. Let’s go over what we search for with them. 

[Price] “One of many first issues I look at is the Android manifest file, as a result of that’s going to inform me lots concerning the software. For instance, has the appliance been accurately signed with the proper key size? I’ll additionally search for among the software’s content material suppliers and have a look at any broadcast receivers to ensure these have been accurately exported. Has the appliance enabled a backup of person knowledge? What does the appliance’s community safety configuration appear to be? What are among the rulings which have been arrange for that? Consider the manifest file because the entrance door for pentesting relating to static evaluation for an Android software.”

[Corbitt] “Drozer seems to be on the internals of an Android software — the actions and broadcast receivers and the like. Let’s discuss actions. If you happen to don’t know what an exercise is, consider it as a display. If you happen to open an Android software and it brings up a login display, that’s an exercise. And once you log in and it brings up your most important menu, that’s one other exercise. If these actions aren’t set accurately with the correct permissions, you may immediately name some actions that you just weren’t meant to see with out logging in first. A couple of years in the past, there was an NFL-related app the place you can subscribe to look at NFL video games in your telephone. There was a bug within the app the place utilizing Drozer, you can name an exercise out of order to succeed in the part of the app the place you can watch NFL video games with out having to login to an account or pay. You possibly can run that exercise that wasn’t set correctly and watch NFL video games at no cost. I discover that basically attention-grabbing, having the ability to name components of the app out of order and bypass issues that you just’re not supposed to have the ability to bypass.”

[Murphy] “Utilizing Burp Suite for the community facet of issues, I like to take a look at what sort of tokens they might be utilizing and if there’s any reuse, be certain that it’s correctly legitimate. I wish to see if the app has correct sanitizing. We’ve discovered plenty of cellular apps that aren’t secured in opposition to tampering. We’re capable of laterally transfer to locations we’re not presupposed to. That occurs to my favourite a part of cellular pen testing; it’s undoubtedly essentially the most enjoyable.”

[Mockler] “ API backend is an important a part of the cellular pen testing life cycle. It’s not 100% solely cellular. More often than not, cellular apps and net apps use the identical backend. I personally love utilizing Burp Suite and tampering with something  that may appear to be cross-site scripting, SQL injection. If there’s an enter, search bar or something there, I’m going to assault it…If you happen to poke at one thing lengthy sufficient, you’ll undoubtedly break it.”

[Mockler] Let’s discuss methodology. Let’s say I provide you with a model new APK — what’s the start line, the place you finish and what’s all the pieces in between? 

[Murphy] “To have the ability to correctly assess an software, it’s a must to perceive what its objective is, what its target market is and what it’s supposed for use for. Analysis the app, use it for a bit and attempt to get a full understanding of its function. That will get me right into a spot the place I can begin enthusiastic about completely different assault vectors and methods to abuse the appliance.  I like to enter static evaluation proper off the bat, open up the binary and poke round to see if I can discover any hard-coded strings that shouldn’t be there.”

[Corbitt] “I agree, I like to start out with static evaluation. If I’m given an APK, logging into the app and seeing what’s happening is an efficient first step. Then decompile the APK with both APK Software or JADX. I’ve discovered a number of hard-coded API keys which have given me entry to Amazon accounts. I am going to the community and API after that utilizing a proxy with Burp Suite and have a look at community site visitors.”

[Price] “My strategy is static code first after which dynamic evaluation. Jeremy talked about an excellent level. If it’s a model new app that I’ve by no means used earlier than, I’ll strive to determine the way it works first after which run a common static evaluation scan to get an concept of what varieties of vulnerabilities the app could also be inclined to. Then I’ll observe that up with data-at-rest evaluation, the place I attempt to search for delicate knowledge in both the system or app’s personal storage that’s not protected ,however needs to be. Then I’ll strive some reverse engineering to see if I can bypass any controls or uncover delicate knowledge by that methodology. After that, I’ll end with a dynamic evaluation of the app.” 

[Mockler] “The way in which a cellular app pen check is meant to go, you’ve that analysis stage and data gathering. Then static evaluation and dynamic evaluation earlier than report writing. I swap static and dynamic and love to do dynamic first to see if I can discover any API keys or shopper IDs, then return to static evaluation…Irrespective of the place you begin, you all the time have to return to enumeration or info gathering.” 

[Mockler] What’s your favourite vulnerability? 

[Murphy] “I like the concept of how [SQL injection] works and the issues it will possibly do.”

[Corbitt] “I discovered one thing very attention-grabbing one time utilizing Burp. It turned out it was utilizing an XOR the place they had been rolling their very own encryption. Due to how xor works, it was mainly the grasp key and I might decrypt each password from there on out when I discovered it.”

[Price] “For me, anytime there are delicate credentials inside a cellular app’s personal storage which are unencrypted. I like the straightforward vulnerabilities that shall be very easy for an attacker to take advantage of if they don’t seem to be resolved.”

[Mockler] “We’re out of time right here however I wish to thank everybody on the panel for speaking about cellular app pen testing methodologies.”

For these looking for to amass or advance their cellular pen testing abilities, NowSecure Academy presents free on-line coaching and paid certifications. Try ‘Crash Course in Getting Began with Cellular App Pen Testing’ and the Cellular Software Safety Foundations certificates curriculum.


To deal with the pen testing challenges of value, frequency and protection, we’re seeing a rising pattern in direction of Pen Testing as a Service.
– Michelle Abraham, IDC Safety and Belief Analysis Director

Cellular App Pen Testing as a Service (PTaaS)

As a result of organizations face difficulties in staffing skilled cellular pen testers and assembling the required pen testing instruments, they usually flip to knowledgeable cellular pen testing companies such because the NowSecure Companies crew for a deep bench of expertise that features the safety professionals featured above. The necessity for a quick, frequent cellular AppSec testing answer drives demand for Cellular Pen Testing as a Service (PTaaS). 

“Software growth and safety groups attempt to ship safe software program shortly to market, balancing velocity and managing threat,” mentioned Michelle Abraham, Analysis Director, Safety and Belief at IDC. “To deal with the pen testing challenges of value, frequency and protection, we’re seeing a rising pattern in direction of Pen Testing as a Service. PTaaS options supply a mixture of steady automated safety testing and deeper guide pen testing to convey collectively the most effective of each worlds.”

NowSecure launched NowSecure Cellular Pen Testing as a Service to bridge the hole between automated and guide cellular safety assessments for steady safety. Designed to supply cellular app builders and safety groups with a more cost effective, environment friendly pen testing answer, NowSecure PTaaS combines periodic knowledgeable guide assessments with the ability of automated steady testing to ship full cellular app protection at a better frequency, all for lower than the price of a single outsourced pen check. 

Clients can take pleasure in most worth by selecting from on-demand and scheduled pen testing complemented by automated steady testing for DevSecOps pipelines, all accessible from a single portal. NowSecure presents a versatile mixture of standards-based pen check choices that embody embedded developer remediation assets, session and retesting to verify mitigation. Dec Study extra about NowSecure cellular pen testing and the NowSecure PTaaS providing — join a private cellular pen testing session to debate your wants right this moment.



Demystifying Mobile App Pen Testing

x