Mobile/App Security Assessment

null

Pre-engagement Interactions

We understand your mobile app through multiple interactions in the pre-engagement process and ensure we identify your critical data and core competencies.

null

Threat Modeling

We understand your mobile app through multiple interactions in the pre-engagement process and ensure we identify your critical data and core competencies.

null

Static Analysis

White hat hackers will perform reverse engineering on your app to extract the source code. We perform extensive source code analysis (based on CERT secure coding standards)

null

Dynamic Analysis

We follow OWASP Mobile Top 10 based vulnerability assessments. We install your app in real devices and perform real time attacks to ensure that your mobile app is secure.

null

Exploitation

Our White hat hackers will try to exploit the vulnerabilities identified during the analysis phase and estimate the extent of losses that are possible through the identified bugs.

null

Reporting

We provide a comprehensive mobile application security report that’s understandable by your dev team. We work with your team to fix the identified loopholes.

Methodology

Mobile Application Pentest Guaranteed Coverage

WHITE PAPERS

Mallet in the Middle

I recently had an assessment reviewing a kiosk application. As I have been working on Mallet recently, this…

10 October 2018

ALL

USE CASE

DNS-shell

DNS-Shell is an interactive Shell over DNS channel. The server is Python based and can run on any…

10 October 2018

ALL

SAMPLE REPORTS

Mallet in the Middle

I recently had an assessment reviewing a kiosk application. As I have been working on Mallet recently, this…

10 October 2018

ALL

Get in touch with us

Please select an area that you would like to enquire about and we’ll get back to you as soon as possible.

Loading

Pretoria

123-456-789

London

123-456-789

Cape Town

123-456-789

Whatsapp

123-456-789

LinkedinRssYouTube