What Our Mobile App Testing Includes
We go above and beyond the OWASP Top 10 to ensure that your applications are secure against a wide range of threats.
Dynamic & static analysis
We review how the application authenticates users and manages session state, including token storage, expiry enforcement, and behaviour after logout.
We assess whether session material can be extracted or reused by an attacker with access to the device.
Insecure data storage
Mobile applications frequently write sensitive data to locations accessible outside the app sandbox with shared preferences, external storage, unprotected databases, or system logs.
We identify what the application persists, where it persists it, and whether it can be accessed by other applications or a physically compromised device.
Network Communication and Certificate Validation
We examine how the application handles TLS, including whether certificate validation is correctly enforced, whether certificate pinning is implemented and bypassable, and whether any traffic is transmitted over unprotected channels.
Cryptographic implementation
We review algorithm selection, key generation, and storage practices within the application. This includes assessing use of platform keystore APIs and identifying cases where cryptographic material is hardcoded, poorly derived, or stored in recoverable locations.
Client-side logic and trust assumptions
We assess where the application makes trust decisions based on locally held state, device properties, or data returned from the server that could be manipulated by an attacker. This includes checks enforced only on the client that have no corresponding server-side validation.
Dynamic & Static Analysis
Our mobile application security testing combines both dynamic and static analysis techniques of the application itself, along with reverse engineering where possible.
Business Logic Flaws
Our testing methodology is aligned with the OWASP mobile testing guidance, ensuring that we cover the most critical mobile application vulnerabilities.
This includes testing for issues such as insecure data storage, insecure communication, and improper authentication mechanisms that could lead to data breaches or unauthorised access.
Detailed Reporting
We provide detailed executive and technical reports that include a summary of findings, technical details, and actionable recommendations for remediation. Our reports are tailored to both technical and non-technical stakeholders, ensuring clarity and understanding.
Pricing
for mobile app penetration testing
No obligation · Strictly confidential · Quote within one business day
Pricing Examples
Indicative ranges only. Your exact price is confirmed after a short scoping conversation – see full service pricing.
What’s Included
- Fixed-price proposal within one business day
- Manual, consultant-led testing. Not automated scans
- Report within 2 business days of testing completion
- No obligation to proceed, and all enquiries are confidential
Mobile App Penetration Testing – common questions
Yes, we test applications on both platforms. Each platform has different security architectures and vulnerabilities, so we tailor our methodology accordingly. With Android we can test on actual physical devices (and not just emulators) to identify real-world vulnerabilities and behavior.
However, with iOS there can often be difficulty with performing grey-box testing of mobile applications. In cases where there is an identical codebase between the two platforms, we would recommend performing testing with Android devices for simplicity and coverage.
Our testing covers insecure data storage (credentials, tokens, sensitive data), insecure communication (SSL/TLS issues, certificate validation), authentication and session management, client-side injection, insecure cryptography, code tampering and reverse engineering protection, business logic flaws, and backend API security.
We follow the OWASP Mobile Security Testing Guide (MSTG).
We can test with just the compiled application file (.ipa for iOS, .apk for Android). However, source code access enables more thorough testing, including static code analysis to identify vulnerabilities before they’re exploitable. We recommend white box testing for applications in most cases, or those handling sensitive data or financial transactions.
Yes, absolutely. We test apps at any stage of development including beta versions, internal enterprise apps, and pre-release applications. You simply provide us with the installation file (.ipa or .apk), and we’ll install it on our testing devices.
We test against your development, staging, or production backend (based on your preference). We intercept and analyse all communications between the mobile app and backend servers to identify API vulnerabilities, authentication issues, and data exposure. If backend testing is needed, we recommend combined mobile and API penetration testing for comprehensive coverage.
If the mobile API backend is also consumed by a companion web application, and there are no functional differences between the mobile and web versions, we would highly recommend performing the backend testing from the web application perspective. This greatly simplifies testing and can allow more time to be spent performing vulnerability discovery, allowing the mobile application testing to focus on local vulnerabilities and weaknesses.
Yes, we test applications built with any framework including React Native, Flutter, Xamarin, Ionic, and Cordova. Cross-platform frameworks sometimes introduce unique vulnerabilities, especially when bridging native and JavaScript code or when developers rely on insecure third-party plugins.
We identify all third-party components and assess their security, including checking for known vulnerabilities, excessive permissions, and data leakage. Many security issues stem from third-party SDKs (analytics, advertising, social media integration) that developers integrate without understanding the security implications.
Get a free quote
Speak with our security team directly
Experts in providing thorough testing coverage
Professional services you can trust
Fixed pricing with no surprises

