Lecture_CSF_10
Lecture_CSF_10
Lecture 10
Mobile Device Security
Penetration Testing
In this case, timely installation of application and OS updates is the only way to protect
yourself. If you can't install an update or it hasn't been released yet, you can temporarily
stop using the vulnerable application: uninstall it from your device or simply unlog it.
How mobile devices and apps are attacked
5.Server-side attacks.
Attacks on the server side of mobile applications can be considered separately from all other
attacks, since in this case the attacker does not need access to the device.
How to protect yourself
In this case, there is not much an ordinary user can do. However, it is possible to reduce the risk of
suffering a server attack by using a complex password and setting up two-factor authentication with
one-time passwords in all critical applications that allow it.
To minimize the likelihood of a successful attack on a mobile application, its developers should test
the feasibility of each of the scenarios described. Different intruder patterns should be taken into
account during development, and some protection measures should be taken at the design stage.
A good recommendation for developers is to implement security development lifecycle (SDL)
practices and regularly analyze the security of the application. Such measures will not only help to
identify potential threats in a timely manner, but will also increase the level of security knowledge
of developers, which will increase the level of security of developed applications in the long term.
What is penetration testing?
Pentest (penetration testing) or "ethical hacking" is the practice of testing a computer system, network, or web
application to identify vulnerabilities that an attacker can exploit. There are many methods of cyberattacks, the most
common of which are:
exploitation of
Malware social credential
hacking web DDoS attacks
exploitation engineering mining.
vulnerabilities
Penetration testing is a set of activities aimed at overcoming the defense systems of the customer's infrastructure by
simulating real attacks. If the attack is successful, a demonstration of exploitation of the identified vulnerabilities is
performed and recommendations for remediation are made.
Pentest includes:
Both of these techniques share the same goal of making a software product secure, but
have different workflows.
Penetration testing is real-time testing, either manually or with automation tools; the
system and its associated component are exposed to simulated malicious attacks to identify
security flaws.
Vulnerability assessment involves examining and analyzing a system using testing tools to
find loopholes in the defenses for multiple variants of malicious attacks. Through this
technique, vulnerable areas are identified that can provide hackers an opportunity to
compromise the system. In addition, the vulnerability assessment process includes various
corrective measures to address the identified weaknesses.
Vulnerability assessment follows a predefined and established procedure, whereas
penetration testing addresses the sole objective of destroying the system irrespective of
the approaches adopted.
How do you perform penetration testing?
System penetration testing may be performed using any of the following approaches:
manual automated
testing testing
Penetration
Post-
testing Intelligence Vulnerability Exploitation. Reporting.
exploitation.
planning analysis
Automatic penetration testing
To name just a few of the popular and widely used penetration testing tools:
Penetration testing can also be classified based on the testing approaches used:
limited scope of
testing based on the the possibility of
requirements in a system destruction
Data vulnerability
given time period or loss of a system lack of time and
(loss, corruption or
(which can lead to in a failed state as a high cost of testing
damage)
other important result of
areas being penetration testing
overlooked)
Hackers, armed with advanced technology with a wide range of resources and tools, often
easily break into a system or network with the intention of damaging a company's
reputation and assets. Penetration testing, more than other types of testing, can be seen as
a tool to identify various security gaps, helping to negate potential threats to the system as
a whole.