Skip to content

Mobile Security Testing Techniques

ID Name Platform
MASTG-TECH-0058 Exploring the App Package platform:ios
MASTG-TECH-0060 Monitoring System Logs platform:ios
MASTG-TECH-0094 Getting Loaded Classes and Methods dynamically platform:ios
MASTG-TECH-0074 Information Gathering - Network Communication platform:ios
MASTG-TECH-0064 Bypassing Certificate Pinning platform:ios
MASTG-TECH-0056 Installing Apps platform:ios
MASTG-TECH-0083 Sandbox Inspection platform:ios
MASTG-TECH-0097 Runtime Reverse Engineering platform:ios
MASTG-TECH-0098 Patching React Native Apps platform:ios
MASTG-TECH-0077 Reviewing Disassembled Native Code platform:ios
MASTG-TECH-0053 Host-Device Data Transfer platform:ios
MASTG-TECH-0081 Get Open Connections platform:ios
MASTG-TECH-0093 Waiting for the debugger platform:ios
MASTG-TECH-0057 Listing Installed Apps platform:ios
MASTG-TECH-0086 Method Tracing platform:ios
MASTG-TECH-0073 Information Gathering - API Usage platform:ios
MASTG-TECH-0084 Debugging platform:ios
MASTG-TECH-0069 Decompiling Native Code platform:ios
MASTG-TECH-0088 Emulation-based Analysis platform:ios
MASTG-TECH-0055 Repackaging Apps platform:ios
MASTG-TECH-0062 Basic Network Monitoring/Sniffing platform:ios
MASTG-TECH-0110 Intercepting Flutter HTTPS Traffic platform:ios
MASTG-TECH-0076 Reviewing Disassembled Objective-C and Swift Code platform:ios
MASTG-TECH-0065 Reverse Engineering iOS Apps platform:ios
MASTG-TECH-0070 Extracting Information from the Application Binary platform:ios
MASTG-TECH-0071 Retrieving Strings platform:ios
MASTG-TECH-0061 Dumping KeyChain Data platform:ios
MASTG-TECH-0091 Library Injection platform:ios
MASTG-TECH-0068 Disassembling Native Code platform:ios
MASTG-TECH-0054 Obtaining and Extracting Apps platform:ios
MASTG-TECH-0063 Setting up an Interception Proxy platform:ios
MASTG-TECH-0080 Get Open Files platform:ios
MASTG-TECH-0052 Accessing the Device Shell platform:ios
MASTG-TECH-0059 Accessing App Data Directories platform:ios
MASTG-TECH-0079 Dynamic Analysis on Non-Jailbroken Devices platform:ios
MASTG-TECH-0067 Dynamic Analysis on iOS platform:ios
MASTG-TECH-0072 Retrieving Cross References platform:ios
MASTG-TECH-0095 Method Hooking platform:ios
MASTG-TECH-0089 Symbolic Execution platform:ios
MASTG-TECH-0096 Process Exploration platform:ios
MASTG-TECH-0087 Native Code Tracing platform:ios
MASTG-TECH-0075 Reviewing Decompiled Objective-C and Swift Code platform:ios
MASTG-TECH-0092 Repackaging and Re-Signing platform:ios
MASTG-TECH-0066 Static Analysis on iOS platform:ios
MASTG-TECH-0085 Execution Tracing platform:ios
MASTG-TECH-0078 Automated Static Analysis platform:ios
MASTG-TECH-0082 Get Loaded Native Libraries platform:ios
MASTG-TECH-0090 Patching platform:ios
MASTG-TECH-0047 Reverse Engineering platform:generic
MASTG-TECH-0048 Static Analysis platform:generic
MASTG-TECH-0050 Binary Analysis platform:generic
MASTG-TECH-0051 Tampering and Runtime Instrumentation platform:generic
MASTG-TECH-0049 Dynamic Analysis platform:generic
MASTG-TECH-0010 Basic Network Monitoring/Sniffing platform:android
MASTG-TECH-0004 Repackaging Apps platform:android
MASTG-TECH-0032 Execution Tracing platform:android
MASTG-TECH-0042 Getting Loaded Classes and Methods Dynamically platform:android
MASTG-TECH-0029 Get Loaded Native Libraries platform:android
MASTG-TECH-0009 Monitoring System Logs platform:android
MASTG-TECH-0041 Library Injection platform:android
MASTG-TECH-0013 Reverse Engineering Android Apps platform:android
MASTG-TECH-0030 Sandbox Inspection platform:android
MASTG-TECH-0023 Reviewing Decompiled Java Code platform:android
MASTG-TECH-0033 Method Tracing platform:android
MASTG-TECH-0015 Dynamic Analysis on Android platform:android
MASTG-TECH-0043 Method Hooking platform:android
MASTG-TECH-0039 Repackaging & Re-Signing platform:android
MASTG-TECH-0008 Accessing App Data Directories platform:android
MASTG-TECH-0037 Symbolic Execution platform:android
MASTG-TECH-0019 Retrieving Strings platform:android
MASTG-TECH-0035 JNI Tracing platform:android
MASTG-TECH-0027 Get Open Files platform:android
MASTG-TECH-0016 Disassembling Code to Smali platform:android
MASTG-TECH-0017 Decompiling Java Code platform:android
MASTG-TECH-0036 Emulation-based Analysis platform:android
MASTG-TECH-0012 Bypassing Certificate Pinning platform:android
MASTG-TECH-0002 Host-Device Data Transfer platform:android
MASTG-TECH-0100 Logging Sensitive Data from Network Traffic platform:android
MASTG-TECH-0040 Waiting for the Debugger platform:android
MASTG-TECH-0108 Taint Analysis platform:android
MASTG-TECH-0007 Exploring the App Package platform:android
MASTG-TECH-0044 Process Exploration platform:android
MASTG-TECH-0006 Listing Installed Apps platform:android
MASTG-TECH-0024 Reviewing Disassembled Native Code platform:android
MASTG-TECH-0025 Automated Static Analysis platform:android
MASTG-TECH-0021 Information Gathering - API Usage platform:android
MASTG-TECH-0022 Information Gathering - Network Communication platform:android
MASTG-TECH-0005 Installing Apps platform:android
MASTG-TECH-0018 Disassembling Native Code platform:android
MASTG-TECH-0109 Intercepting Flutter HTTPS Traffic platform:android
MASTG-TECH-0003 Obtaining and Extracting Apps platform:android
MASTG-TECH-0034 Native Code Tracing platform:android
MASTG-TECH-0045 Runtime Reverse Engineering platform:android
MASTG-TECH-0026 Dynamic Analysis on Non-Rooted Devices platform:android
MASTG-TECH-0031 Debugging platform:android
MASTG-TECH-0020 Retrieving Cross References platform:android
MASTG-TECH-0014 Static Analysis on Android platform:android
MASTG-TECH-0001 Accessing the Device Shell platform:android
MASTG-TECH-0028 Get Open Connections platform:android
MASTG-TECH-0038 Patching platform:android
MASTG-TECH-0011 Setting Up an Interception Proxy platform:android