Главная
Study mode:
on
1
Intro
2
Talk structure
3
Google Play Protect programs to help developers
4
Websites to help developers
5
Insecure connections
6
Use of insecure network protocols
7
Cryptography and authentication
8
Embedded third-party secrets
9
Private file access
10
Private date overwrite due to ZIP file traversal
11
Unprotected app parts
12
Intent redirection
13
Incorrect URL verification
14
Incorrect sandboxing of scripting language
Description:
Explore common Android app vulnerabilities in this 54-minute conference talk by Sebastian Porst from Bugcrowd's LevelUp 0x05 event. Gain insights into vulnerabilities frequently discovered by security researchers in top Google Play apps, learn detection techniques, and understand remediation strategies. Drawing from experience with Google Play's Security Rewards Program, delve into topics such as insecure connections, cryptography and authentication issues, embedded third-party secrets, private file access, ZIP file traversal vulnerabilities, unprotected app components, intent redirection, URL verification flaws, and incorrect sandboxing of scripting languages. Access accompanying slides and additional Bugcrowd University resources to enhance your understanding of Android app security.

Overview of Common Android App Vulnerabilities

Bugcrowd
Add to list