Seven Deadly Sins of Mobile Application Development - Unlocking Mobile Hacking Vulnerabilities
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Overview
Hacking Mobile Apps: WiFi Pineapple
Hacking Mobile Apps: The ideal setup
Hacking AMF: Raw traffic AMF is a binary format
Trusting the client
Not requiring encryption • Mobile traffic is easy to hijack & sniff . Most mobile apps are not using SSL - A gasp of horror is appropriate • Many of the ones that use SSL do it wrong!
Allowing lifetime sessions
Not keeping secrets • Session tokens/cookies are sent with each request - Easy to steal • Mobile app can store local data unlike web browser - Web browsers always send their cookies in each request
Allowing repeat requests
No curfew for requests As discussed, sessions last a long time • Individual requests allowed to stay out partying too long
Failing to prevent altered requests
Hacking Mobile Apps: Fantasy Football
Hacking Mobile Apps: Examples
Avoiding the 7 Deadly Sins
Taught by
OWASP Foundation
Related Courses
Enterprise and Infrastructure SecurityNew York University (NYU) via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Hacking Laboratuvarınızı Oluşturun
Udemy CISM Cert Prep: 3 Information Security Program Development and Management
LinkedIn Learning Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning