Skip navigation EPAM
  • Enter your search query or select one from the list of frequent searches below. Use up and down arrows to review and enter to select.

Exploiting Android Application Vulnerabilities: MITM-Based Client-Side SQL-Injection

Artem Chaykin

Senior Security Researcher, Cyber R&D Lab
Research
  • Application Security

When conducting a security assessment, you cannot view each discovered vulnerability individually, and you have to consider how an attacker thinks. Once they uncover one vulnerability, they will look for a way to use it alongside others to get access to the data they want. They will follow the trail of vulnerabilities until they get to their desired result. As security analysts, we have to adopt the same mindset and look at it from the perspective of different types of attackers. In this article, we will share our approach to identifying these types of vulnerabilities. For anonymity purposes, we’re publishing only fragments of the source code and HTTP requests.

Click here to access the full research whitepaper.

We Can Help

Our experts can help identify vulnerabilities and threats to keep your business secure.