Android Application Penetration Testing

Get professional advice from our consultants regarding your Android vulnerabilities

android penetration testing

What to Expect in our Android Pentesting Service

The Android application attack surface consists of all components of the application, including the supportive material necessary to release the app and to support its functioning. 

  • Mobile App Authentication Architectures
  • Network Communication
  • Data Storage on Android
  • Cryptographic APIs
  • Local Authentication on Android
  • Network APIs
  • Android Platform APIs
  • Code Quality and Build Settings for Android Apps
  • Tampering and Reverse Engineering on Android
  • Android Anti-Reversing Defenses
android penetration testing architecture

Our Methodology

CTD’s approach to Android application assessments includes reviewing how application reacts against common input attacks, server-side controls, data communication paths and client-related issues

Static Testing

Search for sensitive information disclosures & decompile to source code

Analyzing Config files: reveals URL, Server credentials, Cryptographic keys, Hard coded passwords

Reverse Engineering: Using reversing tools, Device Binding, 
Impede Comprehension, Impede Dynamic Analysis and Tampering

android static penetration testing

Dynamic Testing

Attempt to inject and bypass authentication controls & review data communications functionality

Input Validation: Injection, Malicious Input acceptance, Command Injection

Buffer Overflow, File Upload, Business logic validations, Error handling/ Info Leakage, Session management, Log tampering

android dynamic analyse penetration testing

Server side Testing

Vulnerabilities specific to web servers: Directory Traversal, Command injection, Remote code execution, SQL injection, Sensitive file exposure, Web server miss configuration exploitation

API/Webservices testing: authorization, IDOR, Injections and exploits, API business logic bypas like skipping payments, API missconfigurations

Identify potential for denial of service (DOS) attacks

server side iot penetration testing

How it works

Contact us

Call us or write us an email with your requirements

Scoping

Establish what needs to be tested and the right approach

Attacking

We attack your applications to discover vulnerabilities

Reporting

We will present all the findings and solutions to fix them

Why our approach is best for you

Our internal penetration test is based on PTES, NIST and OWASP standards combined with our
over 10 years experience as certified security engineers

Certified Experts

Highly Technical. Effective Communication. Trust

Andrei Pusoiu
Danie Ciobanu Co-Founder CEH Certified Cyber Security Engineer
Daniel Ciobanu
Alexandru Armean
Veronica Mihaiu OSCP Certified Cyber Security Engineer
Veronica Mihaiu
Razvan Furdui OSCP Certified Cyber Security Engineer
Razvan Furdui
Offensive Security OSCP Certification
Certified Ethical Hacker Certification
CISM Certification Security Manager Alexandru Armean
certified penetration tester GIAC GPEN

Who recommends us

The team is very professional, even going the extra mile caring for customer needs and all the details of the collaboration. This attention to detail both for the human factor and the technical expertise motivated me to have the ongoing project and wish to maintain this for the foreseeable future.​
Catalin Priscornita testimonial picture for Cyber Threat Defense
Catalin Priscornita
CEO, Blitz.ro
Cyber Threat Defense has been a valuable partner in securing our software. Their outside the box perspective has pointed us attack scenarios that we are now paying more attention to.
I recommend CTD. They will certainly improve the level of security in your company.
Andrei Andreias testimonial picture for Cyber Threat Defense
Adrian Andreias
CEO, hosterion.com

Need Android penetration testing?

Contact our offensive security experts today to discuss your requirements

    Danie Ciobanu Co-Founder CEH Certified Cyber Security Engineer

    info@ctdefense.com
    +40 770 348 361

    Care To be Cyber Aware!
    Cyber Threat Defense Logo