Penetration Testing
search
⌘Ctrlk
Penetration Testing
  • Web
    • Reconnaissance
    • Open Source Intelligence
    • Misconfiguration
    • Identity Management
    • Broken Authentication
    • Broken Authorization
    • Session Management
    • Input Validation
    • Error Handling
    • Weak Cryptography
    • Business Logic
    • Client Side
    • API Attacks
  • Mobile
    • Mobile App Taxonomy
    • Mobile App Security Testing
    • General
      • Mobile App Authentication Architectures
        • General Guidelines on Testing Authentication
        • Verifying that Appropriate Authentication is in Place
        • Best Practices for Passwords
        • Stateful Session Management
        • Session Timeout
        • User Logout
        • Two-Factor Authentication
        • Stateless (Token-Based) Authentication
        • OAuth 2.0 Flows
        • Login Activity and Device Blocking
      • Testing Network Communication
      • Cryptography in Mobile Apps
      • Testing Code Quality
      • Tampering and Reverse Engineering
    • Android
    • iOS
  • Cloud
    • Reconnaissance
    • SaaS
    • IaaS
    • Azure
    • AWS
    • GCP
    • IBM
    • Digital Ocean
    • Kubernetes
    • CI/CD
    • Active Directory
  • Network
    • Introduction
    • Intelligence Gathering
    • Vulnerability Analysis
    • Logical Vulnerabilities
    • Exploitation of Remote Services (User-Mode)
    • Exploitation of Remote Services (Kernel-Mode)
  • Wireless
    • Page 4
  • iot
    • Page 5
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Mobilechevron-right
  2. General

Mobile App Authentication Architectures

General Guidelines on Testing Authenticationchevron-rightVerifying that Appropriate Authentication is in Placechevron-rightBest Practices for Passwordschevron-rightStateful Session Managementchevron-rightSession Timeoutchevron-rightUser Logoutchevron-rightTwo-Factor Authenticationchevron-rightStateless (Token-Based) Authenticationchevron-rightOAuth 2.0 Flowschevron-rightLogin Activity and Device Blockingchevron-right
PreviousGeneralchevron-leftNextGeneral Guidelines on Testing Authenticationchevron-right