O'Reilly logo

IoT Penetration Testing Cookbook by Aditya Gupta, Aaron Guzman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

Interacting with commands originating from applications over to a mobile platform is a powerful capability. If not secured properly, unauthorized apps can hijack commands and access data that was not intended to be received by unintended parties. When using platform APIs, the following practices should be considered:

  • Do not export sensitive functionality through IPC unless these mechanisms are properly protected.
  • Inputs from external sources and users should be validated and sanitized, if necessary. This includes data received via the user interface, IPC mechanisms such as intents, custom URL handlers, and network sources.
  • WebViews should be configured to allow only the minimum set of protocol handlers required such as HTTPS ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required