Analyze package files and perform vulnerability assessment for APIs used by the application.
Analyze package files and perform vulnerability assessment for APIs used by the application.
We provide highly accurate results by using a combination of manual assessment by experienced assessors and supplementary assessment with tools. After the diagnosis is complete, a detailed report on the discovered vulnerabilities is prepared, and the reproduction procedure and countermeasures against the vulnerabilities are reported in detail.
Based on the customer's specifications, we will examine the system behind the application, the scope of the diagnosis target, and the diagnosis policy. We will then send you a quote.
※ If a confidentiality agreement is required, it will be signed prior to the quote.
Coordinate the diagnosis date and time and complete the contract procedure.
At Gehirn, we mainly conduct manual assessments, with tool assessments as a supplement. From the attacker's point of view, we use our own methods to find vulnerabilities that cannot be detected by tools alone.
The severity of the vulnerability risk is determined based on the expert knowledge of Gehirn's assessors, and a report is prepared on what kind of problems the vulnerability could cause by hypothesizing specific scenarios. After submitting the report to the customer, the customer decides whether or not to modify the software, and a re-diagnosis is conducted after the modification.
Application Package Analysis
Manifest Files and Request Permissions
Activity Abuse
Misuse of Broadcast Receivers
Abuse of Content Providers
Misuse of Services
Databases
File Management
External Storage
System Log
WebView
Cryptography and Hashing
Security on communication and communication paths (HTTP)
Server-side Security
Combined with Manual Diagnosis
Payment Services
Communication (Analysis of Proprietary Protocols)
Cheats in the Local Environment
Copyright Protection
※ If requested, these item can also be included in the diagnosis.
Application Package Analysis
Multitasking-related Functional Analysis
URL Scheme
Databases
File Management
System Log
WebView
Cryptography and Hashing
Security on communication and communication paths (HTTP)
Server-side Security
Combined with Manual Diagnostics
Payment Services
Communication (Analysis of Proprietary Protocols)
Cheats in the Local Environment
Copyright Protection
※ If requested, these item can also be included in the diagnosis.
If you have any questions about Gehirn's vulnerability analysis or disaster prevention information distribution system, feel free to contact us via the form below. One of our representatives will respond as soon as they can.