DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Mobile App Risks

4/5/2020

 
  • Weak Server Side Control
  • Insecure Data Storage
  • Insufficient Transport Layer Protection 
  • Unintended Data Leakage
  • Insecure Authorization and Authentication
  • Insufficient Cryptography
  • Client Side Injection
  • Security Decisions via Untrusted Inputs
  • Improper Session Handling 
  • Lack of Binary Protection
  • Improper Platform Usage
  • Insecure Communication
  • Code Tempering 
  • Reverse Engineering 
  • Extraneous Functionality 

Comments are closed.

    Categories

    All
    Chapter-1
    CISSP
    SOC
    Threat Detection
    Threat Hunting
    Threat Modelling

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity