android-icon

Setup Device

Introduction

Emulator

Tools

Vulnerable Mobile Apps

HTTP/HTTPS interception

Review Vulnerabilities

Reverse engineering and Static analysis

Code modification and Debugging and Run-time analysis

Security Decisions Via Untrusted Inputs

Client side injection

Unintended Data Leakage

Insecure Data Storage

Poor Authentication And Authorization

Weak Encryption