
Mobile Application Security Testing
Mobile application security testing is the procedure of assessing the security integrity of applications that run on mobile device platforms and operating systems.
Security testing is vital as mobile apps introduce significant configuration changes to the device and its operating system. These changes should be assessed, to determine if they introduce security vulnerabilities that could be exploited to compromise the device and the data it processes, stores or transmits.
Security testing of a mobile app is an art. The art of thinking like an attacker – identifying and exploiting vulnerabilities in the app that would allow unauthorised access.
The Risk Crew mobile application security testing methodology is comprised of 4 simple steps:

Step 1: Preparation
Review of all available information associated with the app. Typically including: reviewing design documentation & artifacts to confirm the primary & supplemental purposes, its design objectives, use, technology stack & intended user roles.
READ MORE
Preparation
The application's development and testing processes are examined for adherence to OWASP best practice. Additionally, hosting service level agreements are reviewed for any security shortcomings.
Risk Crew will provide a comprehensive report detailing vulnerabilities in design, development & deployment documentation with recommended remedial measures.
Step 2: Evaluation
Security testers seek to identify security vulnerabilities. The app is evaluated for potential exploitable weaknesses in two states: both before & after its installation.
Typically, an evaluation would include assessing & conducting the following activities to identify associated security vulnerabilities:
READ MORE
Evaluation
Security testers seek to identify security vulnerabilities. The app is evaluated for potential exploitable weaknesses in two states: both before & after its installation.
Typically, an evaluation would include assessing & conducting the following activities to identify associated security vulnerabilities:
- File system analysis
- Package analysis
- Reverse engineering
- Static analysis
- Dynamic analysis
- Inter-Process Communication Endpoint Analysis
- Content providers
- Intents
- Broadcast receivers
- Activities
- Services
Risk Crew assess all mobile apps for vulnerabilities recognised in the OWASP Top 10 Mobile Risks list at a minimum.
Step 3: Exploitation
All vulnerabilities identified, are then confirmed & documented for exploitation.
Each vulnerability is manually exploited by testers to provide documented evidence of “proof of exploit” to determine & confirm the remediate action required to mitigate the vulnerability.
READ MORE
Exploitation
All vulnerabilities identified, are then confirmed & documented for exploitation.
Each vulnerability is manually exploited by testers to provide documented evidence of “proof of exploit” to determine & confirm the remediate action required to mitigate the vulnerability.
This step is critical as it confirms the actual attack surface associated with the app.
Step 4: Reporting
Risk Crew documents a detailed report of findings & remedial recommendations.
Reports specify each vulnerability found, its level of severity, description, specific location where it exists, visual evidence of its exploitation and step-by-step instructions for its remediation.
Risk Crew Deliverables
Risk Crew delivers an all-encompassing service to includes testing, a detailed report of findings and remedial recommendations, a courtesy workshop and on-call assistance.

Detailed Report
The report details specific vulnerabilities identified on the platform, how they were identified, methods and tools used to identify them and visual evidence if applicable. The report shall indicate a security vulnerability risk rating for risk reduction references.

Stakeholder Workshop
The report is presented in a workshop with applicable business stakeholders to ensure their understanding of the findings, the associated business impact & recommended actions to reduce the risk associated with application.

On-call Advice Assistance
We provide advice and assistance for 30 days following the report submittal and answer any questions that arise from implementing remedial actions and ensuring risk reduction.

Retesting Included
We offer retesting to verify remedial actions were effective. Upon completion, we’ll provide you a summary report verifying remedial measures have been implemented.

Transparent Pricing
Our fixed pricing services come with no unexpected added costs. Additionally, we offer a managed service to conduct penetration testing on a continual basis.

Customer Promise
We offer retesting to verify remedial actions were effective. Upon completion, we’ll provide you a summary report verifying remedial measures have been implemented.
Mobile Application Penetration Testing Benefits
Risk Crew reviews the device hardware, operating system and applications for existing security vulnerabilities which if exploited, could potentially allow unauthorised access.
Testing activities may include but are not limited to:
✓Retrieving and/or unlocking cached credentials
✓Missing security patches, updates & fixes
✓Local Security Policy Circumvention
✓Password and pin cracking
✓Configuration data leakage
✓Unauthorised peer-to-peer connections (WiFi, Bluetooth)
✓Service enumeration
✓Geo-location data leakage
✓Encryption strength
✓Unauthorised tethering
Additionally, Risk Crew test the robustness of any controls such as passwords, PIN numbers, authentication, firewalls, VPS, anti-malware or encryption protection deployed to ensure the security integrity of the application and connectivity to business systems.
Why Choose Risk Crew
Our experienced security engineers implement detailed Mobile Device Testing methodologies to effectively assess your businesses capabilities to detect and mitigate an attack against your business’s mobile devices. All security testing engineers are thoroughly vetted and subject to in-depth professional, criminal and credit records checks.
When you choose Risk Crew, you’re electing to work with qualified experts.

Best Practice
Risk Crew follows best practices including OWASP and NIST

Accredited
Engineers carry CREST, C√SS, C│EH and GIAC credentials

Certified
Engineers hold ISACA CISSP, CISM and CRISC certifications

Subject Matter Experts
Risk Crew engineers are SMEs with published articles in industry journals & magazines
Find out how Risk Crew can help reduce the security risks to mobile applications.
Request a Security Testing Quote
Our experts will contact you to discuss your specific requirements
Frequently Asked Questions
What is mobile application security testing?
Mobile application security testing is the process by which a mobile app is tested, for the presence of security vulnerabilities — that if exploited, could compromise the security integrity of that app.
What should mobile application security testing include?
Mobile app security testing should not only identify security vulnerabilities associated with the app but also uncover any associated with client-server architecture and Application Programming Interfaces (APIs) — where systems access and transmit data.
What is the difference between mobile device and mobile application testing?
Mobile device testing is the process of assessing the security integrity of the mobile device build and its connectivity. Mobile app testing is the process of assessing the security integrity of a specific application running on a device and its interfaces.
Is mobile application testing important?
Yes. Mobile application security testing is critical in verifying the security integrity of a mobile application. It seeks to identify any associated security vulnerabilities that if exploited, could result in unauthorised access to information process, stored or transmitted by the application.