MOBILE TESTING

Mobile applications and the devices upon which they run have quickly become a core part of everyday technology. With such a surge in mobile application development, attack surfaces have increased remarkably, and so there is a need for mobile application penetration testing.

Mobile application and mobile device penetration testing

Nettitude has a team of mobile application and mobile device security experts who are able to provide assurance around a multitude of technologies. So, whether it’s iOS, Android or something else entirely, Nettitude are well equipped to provide mobile penetration testing services.

  • Ensure your mobile applications or mobile devices are not presenting an easy point of entry for attackers
  • Ensure organisation owned mobile devices are safe to use by employees
  • Integrate secure development practices into the mobile application software development lifecycle

Request a free quote

CREST-CHECK-ASV-STAR-CBEST-

When is mobile application penetration testing applicable?

No matter how basic, any mobile application forms part of an organisations attack surface and should therefore be included within the scope of regular penetration testing. Mobile applications which exhibit the following traits should be a particular priority for penetration testing:

  • Access to sensitive data
  • Perform critical functionality
  • Interact with assets housed in an organisations estate

When is mobile device penetration testing applicable?

Nettitude routinely deliver mobile device penetration tests, which focus on the configuration of an entire mobile device, rather than the applications which sit upon the device. Where applicable, Nettitude will also review the Mobile Device Management (MDM) policy associated with the device.

Situations in which a mobile device penetration test may be particularly important include:

  • Devices aimed at a vulnerable demographic, for example children
  • Devices configured for remote workers to access organisation data and infrastructure
  • Devices designed to handle critical data and functionality
  • Devices that have been restricted to run only a limited number of allowed applications

How do we perform mobile penetration tests?

The exact methodology employed will vary based on the specific requirements of the mobile penetration test, which are gathered early on in the process.  Areas inspected include, but are not limited to:

  • Architecture and design
  • Data handling
  • Cryptography
  • Authentication
  • Authorisation
  • Session management
  • Network communication
  • Environmental interaction
  • Code quality

Nettitude can replicate threat actors of varying sophistication and prior knowledge. Depending on the requirements of the engagement, the exact approach will vary across a spectrum of ‘black box’ to ’white box’. The former replicates an attacker with no prior knowledge of the target, whereas the latter tends more towards full access to developers, source code, credentials, documentation, etc.

What is the output from a mobile penetration test?

Whether it’s a mobile application penetration test or a mobile device penetration test, the output remains the same.

Nettitude produce one management report and one technical report per engagement.  The former is designed for a non-technical audience and describes the outcome of the engagement in terms of risk. The latter describes the findings in depth and is designed for a technical audience.  All Nettitude reports are subject to a rigorous quality assurance process prior to delivery.

Remedial advice is of key importance and to that end Nettitude provide clear, relevant and actionable next steps, which can be followed to improve the mobile application or devices security posture.

Finally, Nettitude strongly encourages a debrief (or ‘readout’) at the end of the mobile penetration test. A debrief is conducted by the lead security consultant from the engagement and provides an open real time forum to ensure maximum understanding and value is obtained from the engagement.