Vulnsy
Mobile27 items

Mobile App Security Checklist

A comprehensive security testing checklist for iOS and Android mobile applications. Covers local data storage, network communication, authentication, cryptographic implementation, and reverse engineering protections based on the OWASP MASTG.

OWASP MASVSOWASP MASTGNIST SP 800-163
Progress: 0 of 27 items
0%
Commands
apktool d target.apk -o target_decoded
jadx -d output target.apk
mobsf
Evidence to capture

snippet of decompiled source with the hardcoded secret highlighted plus the file/line reference and proof the credential is valid against the live API.

Commands
adb shell run-as <package> cat /data/data/<package>/shared_prefs/<file>.xml
Commands
apktool d target.apk && cat target/AndroidManifest.xml
Commands
mobsf
Commands
objection --gadget com.target.app explore --startup-command "android sslpinning disable"
frida -U -l frida-android-pinning-bypass.js -f com.target.app
Commands
frida-ps -U
frida -U -f com.target.app -l hook.js --no-pause
Commands
adb shell am start -W -a android.intent.action.VIEW -d "myapp://path?param=test" com.target.app
Commands
adb logcat | grep -iE "password|token|secret|cookie"
Commands
objection --gadget com.target.app explore --startup-command "android root disable"
Commands
adb shell run-as com.target.app find /data/data/com.target.app -type f
objection --gadget com.target.app explore --startup-command "ios keychain dump"
Commands
drozer console connect
adb shell am start -n com.target.app/.SensitiveActivity
Commands
apktool d target.apk -o target_decoded
apktool b target_decoded -o patched.apk && apksigner sign --ks key.jks patched.apk

Industries Using This Checklist

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial