Android Pentesting

In this edition of Pentest Diaries, we had the opportunity to sit down with three of our distinguished Core members to talk Android Pentesting: https://twitter.com/harshbothra_https://twitter.com/pcastagnarohttps://twitter.com/b0rn2pwn1:00 What’s your opening move when starting a pentest?6:00 What tools are they using?  11:00 Out of Static, Dynamic, API testing, which takes the majority of your time? 18:14 What are some of the blockers you discover in Android pentesting? 26:55 What sort of exploit chains have you personally found? 34:44 Is there a place to learn more about exploit chaining for Android?36:55 Takes on Windows 11 running Android native applications. 43:12 Why is Android pentesting important?Listen to the whole podcast to get the most out of the Core's amazing takes on this subject. 

Om Podcasten

Welcome to Pentester Diaries, a new podcast series that shines a light on the – not so secret, somewhat anonymized, and at times glamorized life of offensive security professionals. In this series, we will gather pentesters from across the globe to learn more about who they are, what is top of mind for them, how they approach pentesting, and much more. Pentesting isn’t just about finding cool bugs and hackers aren’t just these black hoodies that the media presents. It’s about understanding applications, continuous learning, leveraging the right tools and techniques, as well as collaborating and growing with others. So let’s take off the hacker hoodie and have a real conversation about this growing profession.