Static analysis
Decompile IPA or APK. Look for hardcoded secrets, insecure crypto, debug builds, exposed components, weak obfuscation.
Static analysis on the IPA or APK, runtime instrumentation with Frida, certificate pinning bypass, secrets in storage, sensitive data in logs, IPC abuse, jailbreak detection bypass. OWASP MASVS aligned.
Coverage follows OWASP MASVS L1/L2 controls plus platform-specific checks for iOS and Android.
Decompile IPA or APK. Look for hardcoded secrets, insecure crypto, debug builds, exposed components, weak obfuscation.
Frida instrumentation on jailbroken device or emulator. Hook security-sensitive functions, bypass jailbreak detection and pinning.
Certificate pinning checks, TLS configuration, custom protocol handlers, deeplink abuse, in-app browser security.
Keychain (iOS) and Keystore (Android) usage, plaintext storage of secrets, sensitive data in shared preferences, backup exposure.
Exported activities, broadcast receivers, content providers, URL schemes, app links. Cross-app data leakage.
Biometric prompt implementation, fallback logic, MFA, session token lifecycle, refresh flows.
OWASP MASVS L1/L2 plus MASTG techniques. Tested on real devices for hardware-backed checks.
Mobile pentest deliverables.
Per-finding: severity, repro steps, screenshots, Frida script if relevant, fix guidance.
L1/L2 control coverage by category. Useful for app-store review and B2B security questionnaires.
iOS and Android specific guidance. Code samples in Swift/Objective-C and Kotlin/Java.
One round of post-fix retest. Each finding re-validated on the patched build.
Common triggers for a mobile pentest.
Apple and Google reject for some security issues. Catch them before review.
Your customer requires a third-party security test before deploying via MDM.
Regulator expects MASVS L2 coverage. We deliver the documentation they accept.
Mobile apps update fast. Annual or semi-annual testing keeps the security posture current with each major release.
Common questions for this engagement type. See main pentest FAQ for shared questions.
Both by default. iOS-only or Android-only on request, scoped accordingly. React Native and Flutter apps tested as well — JS bundle inspection on top of platform-specific work.
Test build with Frida-hooking capability is preferred. We can also test production builds with bypass techniques, but coverage is broader on debug builds.
No. We test on our lab devices (iPhone + Android with various OS versions). Specific device-only issues (e.g., a specific Samsung Galaxy model) need device shipped to us.
30-minute scoping call covers platforms, build access, and timeline. Free, no NDA needed.