Mobile Application Penetration Testing
Movement, Pivoting and Persistence
Practical Malware Analysis & Triage
Access Control Vulnerabilities
Authentication Vulnerabilities
Business Logic Vulnerabilities
Cross-Origin Resource Sharing (CORS)
Cross-Site Request Forgery (CSRF)
HTTP Host Header Vulnerabilities
Information Disclosure Vulnerabilities
Server-Side Request Forgery (SSRF)