When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application. A penetration test was also performed against parts of the system. If an attack was successful, this was considered a vulnerability. The attacks that were identified and performed were a NoSQL injection attack a man-in-the-middle attack and reverse engineering. Through the man-in-the-middle attack and reverse engineering, breaching security properties such as confidentiality and integrity was possible. The NoSQL injection attack was not successful in breaching neither. No results from these could be used to exploit the system ...
Ethical hacking and penetration testing are two methods often used when organizations and companies ...
Injection attack is the most critical website security risk, and SQL-injection attack is the most re...
With the advancements made in the field of data science, smart IoT devices are be-coming increasingl...
When making new software systems, security testing should always be included in the process. In this...
Today’s massive usage of smartphones has put a high demand on all application developers in the matt...
As more services previously conducted physically are being conducted on mobiles, the security of mob...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used t...
Web application vulnerabilities of critical are commonly found in web applications. The arguably mos...
The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3...
The purpose of this thesis is to show how to use vulnerability testing to identify and search for se...
This thesis covers the security testing of a system with connected devices. In a world with an ever-...
The widespread usage of smartphones and mobile applications in Sweden exposes the users to potential...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...
A mobile application has been developed to be used for assistance in crisis scenarios. To assure the...
Ethical hacking and penetration testing are two methods often used when organizations and companies ...
Injection attack is the most critical website security risk, and SQL-injection attack is the most re...
With the advancements made in the field of data science, smart IoT devices are be-coming increasingl...
When making new software systems, security testing should always be included in the process. In this...
Today’s massive usage of smartphones has put a high demand on all application developers in the matt...
As more services previously conducted physically are being conducted on mobiles, the security of mob...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used t...
Web application vulnerabilities of critical are commonly found in web applications. The arguably mos...
The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3...
The purpose of this thesis is to show how to use vulnerability testing to identify and search for se...
This thesis covers the security testing of a system with connected devices. In a world with an ever-...
The widespread usage of smartphones and mobile applications in Sweden exposes the users to potential...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...
A mobile application has been developed to be used for assistance in crisis scenarios. To assure the...
Ethical hacking and penetration testing are two methods often used when organizations and companies ...
Injection attack is the most critical website security risk, and SQL-injection attack is the most re...
With the advancements made in the field of data science, smart IoT devices are be-coming increasingl...