How to do it...

Interacting with commands originating from applications over to a mobile platform is a powerful capability. If not secured properly, unauthorized apps can hijack commands and access data that was not intended to be received by unintended parties. When using platform APIs, the following practices should be considered:

  • Do not export sensitive functionality through IPC unless these mechanisms are properly protected.
  • Inputs from external sources and users should be validated and sanitized, if necessary. This includes data received via the user interface, IPC mechanisms such as intents, custom URL handlers, and network sources.
  • WebViews should be configured to allow only the minimum set of protocol handlers required such as HTTPS ...

Get IoT Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.