Mobile Application Penetration Testing
During this phase, we will comb through your source code looking for potential vulnerabilities. Basically, we will take and decompile the IPA and APK files performing reverse engineering and identifying security vulnerabilities.
During this phase we perform security assessments on the application during runtime and identify vulnerabilities adversaries may exploit. For instance, triggering events out of sequence, server vulnerabilities, etc.