Slide 13
Slide 13 text
API calls or endpoints
understanding the way some security controls are
implemented
root detection -> SuperUser
hardcoded sensitive information inside the code
backdoor accounts, API keys and secrets,
passwords...
interesting strings
points of encryption and obfuscation so we can
decrypt and de-obfuscate
What we are
looking for?