By Het Mehta | Published: 2025-04-04 | Last Updated: 5/7/2025
Disclaimer
Performing penetration testing without explicit, written permission from the application owner is illegal and unethical. This content is provided for educational purposes only.
This checklist provides a structured approach to Android application penetration testing, covering key phases from reconnaissance to detailed analysis. It heavily references the essential MASVS (Mobile Application Security Verification Standard) and MASTG (Mobile Security Testing Guide).
Ensure you have the necessary tools and environment:
AndroidManifest.xml
: res/
) & Code: lib/
): # Example: Launching an exported activity with an extra
adb shell am start -n com.victim.app/.SecretActivity -e user_id 1337
<img src="x" onerror="alert('1337')">
),
JS Interface (javascript:AndroidInterface.stealData()
).
// Example: Calling exposed Java method from WebView JS context
javascript:prompt(AndroidBridge.getApiKey())
# Example: Testing for IDOR/BOLA
GET /api/v1/users/123/profile HTTP/1.1 --> Change 123 to another user's ID
Host: api.victim.com
Authorization: Bearer
...
This checklist provides a solid foundation. Remember to adapt your testing based on the specific application and stay updated with OWASP resources and new techniques.