2FA - Response Manipulation
|
Authentication |
100 |
|
Insecure Direct Object Reference
|
Web Application |
100 |
|
Review comment and Metadata
|
Web Application |
100 |
|
Default Credentials
|
Web Application |
100 |
|
Metafiles - Info Leakage
|
Web Application |
100 |
|
XXE
|
Web Application |
100 |
|
SSRF
|
Web Application |
100 |
|
REST API HTTP Methods
|
Web Application |
100 |
|
Guessable Session ID
|
Web Application |
100 |
|
User Password Enumeration
|
Web Application |
100 |
|
Client Side Validation Bypass
|
Web Application |
100 |
|
Server Fingerprint
|
Web Application |
100 |
|
Bruteforce
|
Web Application |
100 |
|
HTML5 Controls
|
Web Application |
100 |
|
Caesar Cipher
|
Encryption |
100 |
|
isDebugger Connected
|
Anti-Debugging |
100 |
|
Network Operator Name
|
Emulator detection |
100 |
|
Emulator Files Check
|
Emulator detection |
100 |
|
International mobile subscriber identity (IMSI)
|
Device ID |
100 |
|
IMEI/ESN
|
Device ID |
100 |
|
SSAID/ANDROID_ID
|
Device ID |
100 |
|
GPS Location
|
Device ID |
100 |
|
Su Binary
|
Root Detection |
100 |
|
Dangerous Props
|
Root Detection |
100 |
|
Test Keys
|
Root Detection |
100 |
|
Hardcoded Secret
|
Binary Protection |
100 |
|
RPATH
|
Binary Protection |
100 |
|
Memory
|
Insecure Data Storage |
100 |
|
External Storage
|
Insecure Data Storage |
100 |
|
Internal Storage
|
Insecure Data Storage |
100 |
|
Shared Preferences
|
Insecure Data Storage |
100 |
|
SQLite Databases (Unencrypted)
|
Insecure Data Storage |
100 |
|
WTF Logs
|
Logs |
100 |
|
Verbose Logs
|
Logs |
100 |
|
Debug Logs
|
Logs |
100 |
|
Warnings Logs
|
Logs |
100 |
|
Informational Logs
|
Logs |
100 |
|
Error Logs
|
Logs |
100 |
|
HTTPS Traffic
|
HTTP Traffic |
100 |
|
HTTP Traffic
|
HTTP Traffic |
100 |
|
Sanity Check Flag
|
Sanity Check |
0 |
|