BEST MOBILE APPLICATION
DELHI | LAXMI NAGAR | NOIDA | ROHINI | GURUGRAM | PUNE | BANGALORE | KERALA
Mobile application have become highly pervasive in recent years. Their quality is essential since application failures can lead to serious consequences, such as damage of corporate reputation or financial loss. The goal of this work is to identify and expose approaches that address the issue of quality assurance for mobile application. In order to drive our systematic mapping study, we derived eight research questions based on the stated goal.
Ultimately, we systematically identified 311 articles based on 4607 captured records. We created clustered views to answer the research questions and used existing surveys to complement our overview of current challenges. The results show an overall upward trend of publications since 2003. Hot topics include automation of GUI tests and assurance of nonfunctional qualities. Aspects of future research could be the integration of review techniques into existing approaches and focusing more strongly on defects addressing the specific characteristics of mobile applications.
MOBILE APPLICATION VULNERABILITY ASSESSMENT AND PENETRATION TESTING APPROACH
STAGE 1:- PLANNING AND INFORMATION GATHERING
STAGE 3:- APPLICATION SECURITY ASSESSMENT
STAGE 4:- REPORTING AND KNOWLEDGE TRANSFER
TOOLS GOING TO BE USED IN MOBILE VA/PT
It is used for many purposes such as
- Assessment of mobile apps.
- Decompilation and disassembly tools.
- Scripts to detect common issues in mobile applications.
- Scripts to automate decrypting binaries, deploying apps, enumerating app details, and more.
We are finalizing the After the successful penetration into the system, privilege escalation technique is used to identify and escalate access to gain higher privileges, such as registry/root access or administrative privileges to that particular it environment system or network.finally binding it with documents , reports and the effort made.