Precursor Security
iOS & Android | CREST-Certified | From £4,500

Mobile App Penetration Testing

CREST-certified engineers assess your iOS and Android applications against the OWASP Mobile Top 10: binary analysis, runtime manipulation, insecure storage, and API security. Fixed-price engagements from £4,500. Compatible with pre-release builds and staging environments.

From £4,500 Fixed Price
CREST Accredited
iOS & Android
Pre-Release Builds Supported
Re-Test Included
Scroll
The Testing Gap

Why automated scanners miss mobile vulnerabilities.

Mobile SAST/DAST tools scan for known patterns. They cannot bypass SSL pinning, hook runtime methods, or test whether your biometric check is implemented server-side. That requires a human with Frida.

Automated Mobile Scanner
Pattern-matching against known CVE signatures
Cannot bypass SSL pinning or root detection
Zero runtime analysis or Frida instrumentation
No backend API security testing
Manual Mobile Security Assessment
Binary reverse engineering with hardcoded secret extraction
Runtime manipulation via Frida: SSL pinning, jailbreak, biometric bypass
Insecure storage audit: SQLite, SharedPreferences, Keychain
Backend API interception: BOLA, auth bypass, data exposure
Mobile Risk Profile

Mobile Application Risk Profile

The vulnerabilities that matter most in production mobile applications. These are the findings that automated scanners cannot detect.

Data Leak Risk
76%

Insecure Storage

Of mobile apps fail basic data storage security checks, exposing user credentials and PII on-device (OWASP MASVS).

Critical Finding
68%

Hardcoded Secrets

Of mobile binaries contain hardcoded API keys, tokens, or credentials discoverable through reverse engineering.

Fixed Price
£4.5K

Starting Price

Single-platform mobile app assessment with OWASP MASVS-mapped report, PoC evidence, and remediation guidance. Re-test included.

Mapped
Controls
OWASPMASVS L1/L2
PCI DSS 4.0Req 6.2.4
ISO 27001Annex A.8.8
Cyber EssentialsPlus
Real Findings

What We Find That Scanners Cannot.

Anonymised examples from recent mobile application penetration testing engagements. These are the vulnerabilities that automated SAST and DAST tools are architecturally incapable of detecting.

Critical
Binary Analysis

Hardcoded Cloud API Keys in Production APK

The production Android APK contained hardcoded AWS access keys and a Firebase service account key in plaintext strings. Both were extractable in under 30 seconds using standard decompilation tooling.

Business ImpactDirect access to production cloud infrastructure and backend databases
Critical
Runtime

Biometric Authentication Bypass via Frida

The iOS application implemented biometric checks client-side only. A single Frida script hooked the LAContext evaluatePolicy callback and returned success without presenting the biometric prompt, bypassing Face ID entirely.

Business ImpactComplete authentication bypass on any device with physical access
High
Data Storage

Unencrypted SQLite Database Containing User Credentials

User session tokens, email addresses, and hashed passwords were stored in an unencrypted SQLite database in the application sandbox. The data persisted after logout and was accessible on rooted/jailbroken devices.

Business ImpactFull credential recovery from a lost, stolen, or compromised device
High
Network

Certificate Pinning Not Implemented on Auth Endpoints

The application did not enforce certificate pinning on any API endpoint. An attacker on the same network could intercept all API traffic, including authentication tokens, using a proxy certificate installed on the device.

Business ImpactMan-in-the-middle interception of all user sessions on untrusted networks
High
Platform

Exported Android Activity Accepts Arbitrary Intent Extras

An exported Activity in the Android application accepted user-controlled Intent extras without validation. A malicious application on the same device could inject parameters that triggered privileged functionality, including payment confirmation.

Business ImpactCross-app privilege escalation enabling unauthorised transactions
Medium
Debug

Verbose Logging Active in Production Build

The production build retained debug-level logging that wrote API request bodies, authentication tokens, and user PII to the device system log, accessible to any application with log read permissions.

Business ImpactCredential and PII exfiltration via co-installed malicious applications
Common Triggers

When Do Organisations Commission This Test?

Mobile app penetration testing is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.

Pre-Launch Security Gate

New app or major release approaching go-live and your stakeholders require independent security sign-off before App Store or Google Play submission.

Compliance Audit Finding

Your ISO 27001, PCI DSS, or Cyber Essentials Plus audit has identified mobile application testing as a control gap.

Enterprise Client Mandate

A client, partner, or enterprise buyer has requested evidence of third-party mobile application security testing before contract award or renewal.

Post-Incident Assessment

A recent security incident involving credential compromise, data leakage, or API abuse from a mobile client has prompted a post-event security assessment.

Cyber Insurance Renewal

Your cyber insurance renewal requires evidence of penetration testing activity against mobile applications that process sensitive data.

DevSecOps Release Gate

You need mobile security testing that integrates with your release cycle. Pre-release builds, staging environments, and rapid turnaround for CI/CD pipelines.

Methodology

Our Mobile App Penetration
Testing Services

Mobile application security testing, also known as mobile app penetration testing, evaluates your iOS and Android apps from an attacker's perspective. Our CREST-certified engineers perform both static and dynamic analysis, covering the full OWASP Mobile Top 10 across client-side binary and server-side API layers.

Binary Analysis

IPA & APK Reverse Engineering

We decompile your IPA and APK binaries to identify hardcoded API keys, secrets, and insecure configurations. No source code required: grey-box testing by default. Also available as a dedicated Android assessment or iOS assessment.

Runtime

Runtime Manipulation

Using Frida and Objection, we bypass SSL pinning, root and jailbreak detection, and biometric authentication checks in real-time against a running application. We hook native methods to modify application behaviour and extract secrets from memory.

Data Storage

Insecure Data Storage

We audit local storage for unencrypted sensitive data: SQLite, SharedPreferences, and Keychain entries. We verify that credentials, tokens, and PII do not persist on-device after session end or application uninstall.

API Layer

Backend API Security

We intercept backend API traffic via Burp Suite to identify BOLA, broken function-level authorisation, and sensitive data exposure in transit. See also our dedicated API security testing service.

Platform IPC

Platform Integration Testing

We test Android Intent injection and exported Activity/Service components, iOS custom URL schemes and Universal Links, and deep link hijacking to ensure third-party apps cannot trigger unauthorised actions or intercept sensitive data.

Auth & Session

Authentication & Session Management

Testing biometric authentication implementation (client-side vs server-verified), session token lifecycle, token storage mechanism security, logout completeness, and whether session fixation or replay attacks can grant unauthorised access to another user's account.

Framework Coverage

Mapped to the OWASP Mobile Top 10

Every mobile app penetration test conducted by Precursor Security is structured against the OWASP Mobile Application Security Verification Standard (MASVS) and covers all ten OWASP Mobile Top 10 risk categories. Your report provides verifiable, framework-mapped evidence for compliance, investor due diligence, and enterprise vendor questionnaires.

M1

Improper Platform Usage

Misuse of OS security features, permissions, and platform controls.

M2

Insecure Data Storage

Unencrypted sensitive data in local databases, shared preferences, or the keychain.

M3

Insecure Communication

Weak TLS, missing certificate pinning, and cleartext data in transit.

M4

Insecure Authentication

Weak session tokens, biometric bypass, and insecure password storage.

M5

Insufficient Cryptography

Weak encryption algorithms, insecure key management, and hardcoded keys.

M6

Insecure Authorization

Broken access control allowing privilege escalation or IDOR vulnerabilities.

M7

Client Code Quality

Memory corruption, code injection, and buffer overflow vulnerabilities.

M8

Code Tampering

App modification, binary patching, and repackaged app distribution.

M9

Reverse Engineering

Absence of binary obfuscation and anti-tampering controls.

M10

Extraneous Functionality

Debug code, hardcoded test credentials, and hidden backend functionality.

Engagement Pipeline

How Our Mobile App Assessment Works

Binary-only testing by default. No source code required. Compatible with pre-release builds and staging environments.

Step 01

Discovery & Scoping

We receive your IPA/APK binary and staging environment credentials. A 30-minute scoping call establishes platform count, user roles, API scope, and whether pre-release or production builds are being tested.

Step 02

Static Analysis

Reviewing decompiled code, permissions, embedded secrets, and identifying insecure configurations without requiring source code. We map the application architecture and API endpoints before dynamic testing begins.

Step 03

Dynamic Testing

Interacting with the running app to test runtime manipulation, authentication bypass, insecure storage, and API security against the OWASP Mobile Top 10. Criticals reported immediately via secure channel.

Step 04

Report & Retest

OWASP MASVS-mapped report with PoC Frida scripts, screenshot evidence, and platform-specific remediation guidance. A free re-test of remediated critical and high findings is included within 30 days.

Deliverables

What You Get

Every mobile application penetration test includes the following deliverables, formatted for both technical teams and non-technical stakeholders.

Executive summary suitable for board, CISO, and cyber insurance submission
Technical findings mapped to OWASP Mobile Top 10 and OWASP MASVS with PoC evidence
CVSS v3.1 severity-rated findings with screenshot and Frida script reproduction steps
Hardcoded secrets inventory: every exposed API key, token, and credential found in the binary
Platform-specific remediation guidance (separate iOS and Android recommendations)
Compliance framework mapping (ISO 27001, PCI DSS, Cyber Essentials Plus)
Free re-test of remediated findings within the assessment window

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats. Assessment window re-testing included at no additional cost.

Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Mobile app penetration testing covers five core areas: (1) Binary analysis, reverse engineering the IPA/APK to find hardcoded secrets, API keys, and insecure configurations; (2) Runtime manipulation, using Frida and Objection to bypass SSL pinning, root/jailbreak detection, and biometric authentication; (3) Insecure data storage, auditing SQLite, SharedPreferences, and Keychain for unencrypted sensitive data; (4) API security, intercepting backend API traffic to identify BOLA, broken function level authorization, and data leakage; (5) Platform integration, testing Android Intent injection and iOS URL scheme abuse. All testing is mapped to the OWASP Mobile Top 10 and OWASP MASVS (Mobile Application Security Verification Standard).

Mobile application penetration testing typically costs between £4,500 and £12,000 depending on app complexity, platform count (iOS-only, Android-only, or both), and backend API scope. A standard single-platform mobile app test (iOS or Android) averages £6,000 for 5-7 days of testing covering binary analysis, runtime manipulation, insecure storage, and backend API security. Dual-platform testing (iOS + Android + shared backend APIs) typically costs £9,000-£12,000. Complex apps with extensive features, multiple user roles, or payment processing typically cost £10,000-£12,000+. We provide fixed-price quotes after reviewing your app architecture and feature set.

While mobile developers understand app functionality and can implement security controls, they rarely have the specialized tools and adversarial mindset for security testing. Security testing requires reverse engineering skills (decompiling APK/IPA binaries, reading smali/assembly code), runtime manipulation tools (Frida, Objection for bypassing SSL pinning and root detection), and mobile-specific attack techniques (intent injection, deeplink hijacking, insecure storage exploitation) that developers don't use in normal development workflows. Moreover, developers test that features work correctly; security testers identify how features can be abused. Professional mobile testing finds vulnerabilities developers never considered.

No. Mobile app penetration testing is performed entirely offline on your provided IPA/APK binaries and in controlled test environments. We never interact with production app stores, live user accounts, or production backend servers (unless explicitly authorized for production API testing). Testing has zero impact on your App Store/Google Play listing, ratings, reviews, or live users. We can test pre-release builds before app store submission to catch security issues early, or test production builds in isolated environments. Your App Store Connect/Google Play Console accounts remain completely untouched.

We only need the compiled binary (IPA for iOS, APK for Android). Source code is optional. Our methodology uses reverse engineering to decompile the binary back to readable code (smali for Android, pseudo-code for iOS), which is sufficient for comprehensive security testing. However, if you provide source code ('white box' testing), we can identify more subtle vulnerabilities in code logic and provide more precise remediation guidance with line-by-line code fixes. Most organizations opt for binary-only ('grey box') testing which balances thoroughness with IP protection.

No. Our testing is conducted under strict NDA and confidentiality agreements with explicit scope limitations: (1) We only reverse engineer components necessary for security testing (authentication flows, data storage mechanisms, API communication), (2) We do not reverse engineer proprietary business logic, algorithms, or trade secrets unless they directly relate to identified security vulnerabilities, (3) All findings and reverse-engineered code are confidential and destroyed after testing, (4) Our ethical standards and CREST accreditation require respecting intellectual property rights, and (5) We carry professional indemnity insurance and have legal safeguards protecting your IP. We are testing security, not stealing secrets. Our reputation depends on absolute confidentiality.

Yes. We test both iOS (IPA) and Android (APK) applications. Our methodology covers platform-specific vulnerabilities: for iOS, we test jailbreak detection bypass, keychain security, certificate pinning, and iOS-specific URL scheme vulnerabilities; for Android, we test root detection bypass, SharedPreferences/SQLite storage security, intent injection, and exported component vulnerabilities. Most organisations benefit from testing both platforms as vulnerabilities often differ between iOS and Android implementations of the same app.

We work with you to obtain appropriate testing credentials: (1) Preferred approach: You provide dedicated test accounts with realistic data in a staging/UAT environment that mirrors production, (2) Alternative: We test in production using test accounts with explicit authorization and coordinated testing windows, (3) For apps requiring device binding or two-factor authentication, we coordinate to register our testing devices and obtain necessary authentication tokens. We never use real customer accounts or attempt to access customer data.

The OWASP Mobile Top 10 is the industry-standard framework for mobile application security risks, covering: M1 Improper Platform Usage (misuse of OS features or security controls), M2 Insecure Data Storage (unencrypted sensitive data in local storage), M3 Insecure Communication (weak SSL/TLS, certificate pinning bypass), M4 Insecure Authentication (weak session management, biometric bypass), M5 Insufficient Cryptography (weak encryption algorithms), M6 Insecure Authorization (broken access control), M7 Client Code Quality (memory corruption, code injection), M8 Code Tampering (app modification, repackaging), M9 Reverse Engineering (lack of obfuscation), M10 Extraneous Functionality (debug code, backdoors). Our mobile app penetration tests provide comprehensive coverage of all OWASP MASVS (Mobile Application Security Verification Standard) controls.