WhiteHat MAST Vulnerability Classes

Mobile Business Logic Assessment (BLA)

Mobile Business Logic Assessment (BLA) utilizes a combined approach of manual security testing augmented with automated scanning.

Testing Methodology Covered By Mobile BLA

Application behavioral analysis

Backend API services

Business logic assessment

Clientside testing

Client-server interaction

Device data forensic

Dynamic black box testing

Network testing

Run-time analysis

Technical - Domains Covered By Mobile BLA

Abuse of functionality




Session management


Input handling

Information leakage

Technical - WhiteHat Mobile BLA Vulnerability Categories

Abuse of Functionality

Access Control: File Permissions

Application Misconfiguration: ARC Disabled

Application Misconfiguration: Backup Allowed

Application Misconfiguration: Debug Attribute

Application Misconfiguration: Stack Smashing Protection Disabled

Binary Protection: Insufficient Code Obfuscation

Binary Protection: Insufficient Jailbreak / Root Detection

Brute Force: Case-Insensitive Password

Brute Force: Login Automation

Brute Force: User Enumeration

Content Spoofing

Credential/Session Prediction

Cross Site Request Forgery

Cross Site Scripting

Cryptography: Custom Algorithm

Cryptography: Hardcoded IV

Cryptography: Hardcoded Key

Cryptography: Improper Certificate Expiration

Cryptography: Improper Certificate Validation

Cryptography: Improper Pseudo-Random Number Generator Usage

Cryptography: Insecure Cipher

Cryptography: Insecure Cipher Mode

Cryptography: Insecure Cipher Padding

Cryptography: Insecure Digest

Cryptography: Non-Unique Keys

Directory Indexing

Disclosure: Hardcoded Password

Information Leakage: Application Cache

Information Leakage: Application Snapshots (Backgrounding)

Information Leakage: Error Disclosure

Information Leakage: Internal Environment

Information Leakage: IP Address

Information Leakage: Logging

Information Leakage: NSURL Cache

Information Leakage: Password

Information Leakage: Sensitive Data

Information Leakage: Sensitive Data Over GET

Information Leakage: Server Version

Injection: HTTP Response Splitting

Insecure Data Storage

Insecure Data Storage: Cookies

Insecure Data Storage: Core Data

Insecure Data Storage: Database Storage

Insecure Data Storage: External Storage

Insecure Data Storage: Plist

Insecure Data Storage: Shared Preferences

Insecure Domain Whitelist

Insecure Password Policy

Insufficient Authentication

Insufficient Authentication: Basic Authentication Usage

Insufficient Authorization (Insecure Direct Object Reference)

Insufficient Password Recovery

Insufficient Process Validation

Insufficient Session Expiration

Insufficient Transport Layer Protection

Interprocess Communication: Insecure Activity

Interprocess Communication: Insecure Broadcast Receiver

Interprocess Communication: Insecure Content Provider

Interprocess Communication: Insecure URL Schemes

Interprocess Communication: Intent Hijacking

LDAP Injection

Non-HttpOnly Session Cookie

OS Commanding

Path Traversal

Position Independent Execution

Predictable Resource Location

Remote File Inclusion

Session Fixation

SQL Injection

Unsecured Session Cookie

URL Redirector Abuse

XML External Entity Injection

Technical Vulnerabilities Covered by Mobile - OWASP 2016 Top 10




Improper Platform Usage


Insecure Data Storage


Insecure Communication


Insecure Authentication


Insufficient Cryptography


Insecure Authorization


Client Code Quality


Code Tampering


Reverse Engineering


Extraneous Functionality