Главная
Study mode:
on
1
Intro
2
Demonstration
3
Interfaces
4
Testing
5
Improvising
6
Interception
7
File Scheme
8
HTTPS
9
Trust Chain
10
hostname verification
11
trust
12
targeted malware
13
bug bounty
14
URL schemes
15
Threat model schemes
16
Threat model schemes demo
17
Summary
18
Thank you
19
Recommendations
20
Extras
21
Cert Printing
Description:
Explore the intricacies of using WebViews in mobile applications through this conference talk from AppSecEU 2015 in Amsterdam. Delve into various aspects including demonstrations, interfaces, testing methodologies, and security considerations. Learn about improvising techniques, interception methods, and the implications of using different URL schemes. Gain insights into threat modeling, targeted malware, and bug bounty programs. Examine the importance of trust chains, hostname verification, and certificate handling in WebView implementations. Conclude with a summary of key takeaways, recommendations for best practices, and additional resources for further learning.

So, You Want To Use A WebView? - Security Considerations and Best Practices

OWASP Foundation
Add to list
0:00 / 0:00