{"id":23652,"date":"2023-05-05T05:44:15","date_gmt":"2023-05-05T05:44:15","guid":{"rendered":"https:\/\/www.booksofall.com\/cn\/?post_type=product&#038;p=23652"},"modified":"2023-05-05T05:44:15","modified_gmt":"2023-05-05T05:44:15","slug":"owasp-mobile-application-security-testing-guide","status":"publish","type":"product","link":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/","title":{"rendered":"OWASP Mobile Application Security Testing Guide"},"content":{"rendered":"<div id=\"reading-mode-page-div-25\" class=\"reading-mode-page-div\">\n<div>\n<h2>Introduction to the OWASP Mobile Application Security Project<\/h2>\n<p>New technology always introduces new security risks, and mobile computing is no exception. Security concerns for mobile apps differ from traditional desktop software in some important ways. Modern <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mobile_operating_system\">mobile operating systems<\/a> are arguably more secure than traditional <a href=\"https:\/\/www.javatpoint.com\/mobile-operating-system-vs-desktop-operating-system\">desktop operating systems<\/a>, but problems can still appear when we don\u2019t carefully consider security during mobile app development. Data storage, inter-app communication, proper usage of cryptographic APIs, and secure network communication are only some of these considerations. The OWASP Mobile Application Security\u00a0<i>Verification Standard\u00a0<\/i>(MASVS) defines a mobile app security model and lists generic security requirements for mobile apps. It can be used by architects, developers, testers, security professionals, and consumers to define and understand the qualities of a secure mobile app. The<a href=\"https:\/\/mas.owasp.org\/\"> OWASP Mobile Application Security<\/a> <i>Testing Guide\u00a0<\/i>(MASTG) maps to the same basic set of security requirements offered by the MASVS and depending on the context they can be used individually or combined to achieve different objectives.<\/p>\n<p>For example, the MASVS requirements can be used in an app\u2019s planning and architecture design stages while the checklist and testing guide may serve as a baseline for manual security testing or as a template for automated security tests during or after development. In the \u201cMobile App Security Testing\u201d chapter we\u2019ll describe how you can apply the checklist and MASTG to a mobile app penetration test.<\/p>\n<\/div>\n<\/div>\n<div id=\"reading-mode-page-div-26\" class=\"reading-mode-page-div\">\n<div>\n<h3>Key Areas in Mobile Application Security<\/h3>\n<p>Many mobile app penetration testers have a background in network and web app penetration testing, a quality that is valuable for mobile app testing. Almost every mobile app talks to a backend service, and those services are prone to the same types of attacks we are familiar with in web apps on desktop machines. Mobile apps differ in that there is a smaller attack surface and therefore more security against injection and similar attacks. Instead, we must prioritize data protection on the device and the network to increase mobile security. Let\u2019s discuss the key areas in mobile app security.<\/p>\n<h4>Data Storage and Privacy (MASVS-STORAGE)<\/h4>\n<p>The protection of sensitive data, such as user credentials and private information, is crucial to mobile security. If an app uses operating system APIs such as local storage or <a href=\"https:\/\/www.geeksforgeeks.org\/inter-process-communication-ipc\/\">inter-process communication (IPC)<\/a> improperly, the app might expose sensitive data to other apps running on the same device. It may also unintentionally leak data to cloud storage, backups, or the keyboard cache. Additionally, mobile devices can be lost or stolen more easily compared to other types of devices, so it\u2019s more likely an individual can gain physical access to the device, making it easier to retrieve the data. When developing mobile apps, we must take extra care when storing user data. For example, we can use appropriate key storage <a href=\"https:\/\/en.wikipedia.org\/wiki\/API\">API<\/a>s and take advantage of hardware-backed security features when available. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fragmentation_(computing)\">Fragmentation<\/a> is a problem we deal with especially on <a href=\"http:\/\/android.com\">Android<\/a> devices. Not every Android device offers hardware-backed secure storage, and many devices are running outdated versions of Android. For an app to be supported on these out-of-date devices, it would have to be created using an older version of Android\u2019s API which may lack important security features. For maximum security, the best choice is to create apps with the current API version even though that excludes some users.<\/p>\n<h4>Cryptography (MASVS-CRYPTO)<\/h4>\n<p><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cryptography\">Cryptography<\/a> is an essential ingredient when it comes to protecting data stored on a mobile device. It is also an area where things can go horribly wrong, especially when standard conventions are not followed. It is essential to ensure that the application uses cryptography according to industry best practices, including the use of proven cryptographic libraries, a proper choice and configuration of cryptographic primitives as well as a suitable random number generator wherever randomness is required.<\/p>\n<h4>Authentication and Authorization (MASVS-AUTH)<\/h4>\n<p>In most cases, sending users to log in to a remote service is an integral part of the overall mobile app architecture. Even though most of the authentication and authorization logic happens at the endpoint, there are also some implementation challenges on the mobile app side. Unlike web apps, mobile apps often store long-time session tokens that are unlocked with user-to-device<\/p>\n<p>authentication features such as fingerprint scanning. While this allows for a quicker login and better user experience (nobody likes to enter complex passwords), it also introduces additional complexity and room for error. Mobile app architectures also increasingly incorporate authorization frameworks (such as OAuth2) that delegate authentication to a separate service or outsource the authentication process to an authentication provider. Using OAuth2 allows the client-side authentication logic to be outsourced to other apps on the same device (e.g. the system browser). Security testers must know the advantages and disadvantages of different possible authorization frameworks and architectures.<\/p>\n<h4>Network Communication (MASVS-NETWORK)<\/h4>\n<p>Mobile devices regularly connect to a variety of networks, including public Wi-Fi networks shared with other (potentially malicious) clients. This creates opportunities for a wide variety of network- based attacks ranging from simple to complicated and old to new. It\u2019s crucial to maintain the confidentiality and integrity of information exchanged between the mobile app and remote service endpoints. As a basic requirement, mobile apps must set up a secure, encrypted channel for network communication using the TLS protocol with appropriate settings.<\/p>\n<h4>Interaction with the Mobile Platform (MASVS-PLATFORM)<\/h4>\n<p>Mobile operating system architectures differ from classical desktop architectures in important ways. For example, all mobile operating systems implement app permission systems that regulate access to specific APIs. They also offer more (Android) or less rich (iOS) inter-process communication (IPC) facilities that enable apps to exchange signals and data. These platform-specific features come with their own set of pitfalls. For example, if IPC APIs are misused, sensitive data or functionality might be unintentionally exposed to other apps running on the device.<\/p>\n<\/div>\n<p>&#8230;&#8230;<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p><iframe style=\"width: 100%; height: 750px; border: none;\" src=\"https:\/\/online.visual-paradigm.com\/share\/book\/owasp-mobile-application-security-testing-guide-1cg1mu4wqq?p=1\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"featured_media":23656,"template":"","meta":{"_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!"},"product_brand":[],"product_cat":[383],"product_tag":[],"class_list":{"0":"post-23652","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-security-privacy","8":"first","9":"instock","10":"shipping-taxable","11":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OWASP Mobile Application Security Testing Guide - BooksOfAll Simplified Chinese<\/title>\n<meta name=\"description\" content=\"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OWASP Mobile Application Security Testing Guide - BooksOfAll Simplified Chinese\" \/>\n<meta property=\"og:description\" content=\"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"BooksOfAll Simplified Chinese\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/\",\"url\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/\",\"name\":\"OWASP Mobile Application Security Testing Guide - BooksOfAll Simplified Chinese\",\"isPartOf\":{\"@id\":\"https:\/\/www.booksofall.com\/cn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg\",\"datePublished\":\"2023-05-05T05:44:15+00:00\",\"description\":\"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#primaryimage\",\"url\":\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg\",\"contentUrl\":\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg\",\"width\":\"827\",\"height\":\"1169\",\"caption\":\"OWASP Mobile Application Security Testing Guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.booksofall.com\/cn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Categories\",\"item\":\"https:\/\/www.booksofall.com\/cn\/categories\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OWASP Mobile Application Security Testing Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.booksofall.com\/cn\/#website\",\"url\":\"https:\/\/www.booksofall.com\/cn\/\",\"name\":\"BooksOfAll Simplified Chinese\",\"description\":\"Biggest IT eBooks library and learning resources - Free eBooks for programming, computing, artificial intelligence and more.\",\"publisher\":{\"@id\":\"https:\/\/www.booksofall.com\/cn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.booksofall.com\/cn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.booksofall.com\/cn\/#organization\",\"name\":\"BooksOfAll Simplified Chinese\",\"url\":\"https:\/\/www.booksofall.com\/cn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/www.booksofall.com\/cn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2022\/06\/booksofall-logo-2.png\",\"contentUrl\":\"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2022\/06\/booksofall-logo-2.png\",\"width\":166,\"height\":30,\"caption\":\"BooksOfAll Simplified Chinese\"},\"image\":{\"@id\":\"https:\/\/www.booksofall.com\/cn\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OWASP Mobile Application Security Testing Guide - BooksOfAll Simplified Chinese","description":"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/","og_locale":"zh_CN","og_type":"article","og_title":"OWASP Mobile Application Security Testing Guide - BooksOfAll Simplified Chinese","og_description":"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!","og_url":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/","og_site_name":"BooksOfAll Simplified Chinese","og_image":[{"url":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"5 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/","url":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/","name":"OWASP Mobile Application Security Testing Guide - BooksOfAll Simplified Chinese","isPartOf":{"@id":"https:\/\/www.booksofall.com\/cn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg","datePublished":"2023-05-05T05:44:15+00:00","description":"Mobile app security requires special considerations due to the unique security risks introduced by new mobile technology. Learn more in this guide now!","breadcrumb":{"@id":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#primaryimage","url":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg","contentUrl":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2023\/05\/OWASP-Mobile-Application-Security-Testing-Guide.jpg","width":"827","height":"1169","caption":"OWASP Mobile Application Security Testing Guide"},{"@type":"BreadcrumbList","@id":"https:\/\/www.booksofall.com\/cn\/owasp-mobile-application-security-testing-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.booksofall.com\/cn\/"},{"@type":"ListItem","position":2,"name":"Categories","item":"https:\/\/www.booksofall.com\/cn\/categories\/"},{"@type":"ListItem","position":3,"name":"OWASP Mobile Application Security Testing Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.booksofall.com\/cn\/#website","url":"https:\/\/www.booksofall.com\/cn\/","name":"BooksOfAll Simplified Chinese","description":"Biggest IT eBooks library and learning resources - Free eBooks for programming, computing, artificial intelligence and more.","publisher":{"@id":"https:\/\/www.booksofall.com\/cn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.booksofall.com\/cn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/www.booksofall.com\/cn\/#organization","name":"BooksOfAll Simplified Chinese","url":"https:\/\/www.booksofall.com\/cn\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.booksofall.com\/cn\/#\/schema\/logo\/image\/","url":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2022\/06\/booksofall-logo-2.png","contentUrl":"https:\/\/www.booksofall.com\/cn\/wp-content\/uploads\/sites\/2\/2022\/06\/booksofall-logo-2.png","width":166,"height":30,"caption":"BooksOfAll Simplified Chinese"},"image":{"@id":"https:\/\/www.booksofall.com\/cn\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/product\/23652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/media\/23656"}],"wp:attachment":[{"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/media?parent=23652"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/product_brand?post=23652"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/product_cat?post=23652"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.booksofall.com\/cn\/wp-json\/wp\/v2\/product_tag?post=23652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}