Articles by

Ostorlab Team

Ostorlab is a community effort to build a mobile application vulnerability scanner to help developers build secure mobile applications. One of the new key components of the scanner detection capabilities is a new shiny static taint engine for Android Dalvik Bytecode that was heavily optimized for performance and low false positives.

Product

June 2017

We are pleased to announce a set of new improvements

Thu 01 June 2017

Security

New Taint Engine ... more vulnerabilities found

We have been for the last few months hard at work developing a new scan engine to identify new cl...

Sun 23 April 2017

Security

Testing Cordova Applications

Hybrid frameworks like Cordova offers the advantage of building one app for multiple platform (su...

Thu 24 November 2016

Before we get into SQL injections and what might go wrong, we'll start by covering some technical information on Content Providers...

For an Android developer, it has become standard practice to use external libraries to easily extend the functionalities of the mobile application . Thanks to Gradle easy dependency integration, features like HTTP frameworks, database ORM, fancy scrolling, efficient image loading, caching, social network integration and many others can be added easily.

Latest posts

Vulnerabilities tested by Google Play Store

Google will start identifying security weaknesses in Apps pushed to the Play Store...

Mon 05 September 2016

Python Concurrency and Parallelism: building a custom ProcessPoolExecutor

At Ostorlab we scan hundreds of Mobile Applications each day, each scan is very resource intensive but at the same time, since the beginning, we had to optimize the code for speed and maximize use of cloud resources.

Mon 18 July 2016

New in Android M and N: Runtime Permissions

In Android, the permission system was one of the major security concerns of the platform for many reasons...

Fri 27 May 2016

Android SSL certificate pinning to prevent Man-in-the-middle attack

Implementing SSL certificate pinning in mobile apps to secure the communication between the user's device and the backend

Wed 11 May 2016

Reversing JNI, or how Facebook is crashing their own application

Apparently Facebook is crashing their apps intentionally in order to test users reaction and evaluate their adherence to Facebook service. This post is however not about the user's behavioral analysis, but about the technical aspects of how it is done - or just an excuse to dive into JNI reversing.

Thu 07 January 2016

What every pentesters should learn in 2016

The last years have come with meaningful changes in the way IT professionals operate and the way we approach security...

Sat 02 January 2016

Ostorlab Beta is out

We are pleased to release the Beta version of our online mobile application security scanner.

Sun 20 December 2015

Best SSL/TLS resources (Attacks, Tools, Talks)

This article will reference the best current resources on SSL/TLS.

Tue 25 August 2015


10 of 10
Next