Skip navigation EPAM
  • Enter your search query or select one from the list of frequent searches below. Use up and down arrows to review and enter to select.

Exploiting Android Application Vulnerabilities: MITM-Based Client-Side SQL-Injection

Artem Chaykin

Senior Security Researcher, Cyber R&D Lab
  • Application Security

When conducting a security assessment, you cannot view each discovered vulnerability individually, and you have to consider how an attacker thinks. Once they uncover one vulnerability, they will look for a way to use it alongside others to get access to the data they want. They will follow the trail of vulnerabilities until they get to their desired result. As security analysts, we have to adopt the same mindset and look at it from the perspective of different types of attackers. In this article, we will share our approach to identifying these types of vulnerabilities. For anonymity purposes, we’re publishing only fragments of the source code and HTTP requests.

Download the full research whitepaper now!

Get Whitepaper

Successfully submitted! Please check your email for the link to the whitepaper you requested.

Oops, something went wrong. Please try again.

If your download doesn't start automatically, please click

Validation failed! Please use the same browser and device that you used to fill out this form. You can also re-submit the form to receive a new download link.

Thank you for helping us keep your information up-to-date.


We Can Help

Our experts can help identify vulnerabilities and threats to keep your business secure.