Products

🔄
PTaaS Platform
DAST Scanner
☁️
Cloud Vulnerability Scanner
🔌
API Security Platform

Pentest

🌐
Web Pentest
🔌
API Pentest
☁️
Cloud Pentest
📱
Mobile Pentest

Company

💰
Pricing
🏢
About Us
💼
Careers
📧
Contact
Talk to Sales →
Pentest › Mobile Security

Mobile App
Penetration Testing
for Android & iOS

Comprehensive SAST + DAST + expert manual pentesting for your mobile applications. 250+ test cases mapped to OWASP Mobile Top 10 and MASVS. Uncover reverse engineering risks, insecure data storage, API weaknesses, and business logic flaws. Report in 7–10 days.

250+
Mobile test cases
7–10
Business days
MASVS
Aligned testing
0
False positives
Hardcoded API key found in APK
Insecure storage fixed & verified ✓
ANDROID
🤖
Android Pentest
SAST scan running...72%
Hardcoded API key
CRIT
Insecure SharedPrefs
HIGH
Root detection bypass
HIGH
Weak SSL pinning
MED
3 critical · 5 high · 8 medium
iOS
🍎
iOS Pentest
DAST scan running...58%
Keychain data exposed
CRIT
Jailbreak bypass
HIGH
Insecure URL scheme
MED
Certificate pinning
LOW
2 critical · 4 high · 6 medium
Platform Coverage

Complete security testing for
Android & iOS apps

Whether you're building a native app, hybrid app, or a web view-based application — we test every layer of your mobile stack with the expertise of certified security engineers.

🤖

Android Penetration Testing

Deep security assessment of Android APKs using SAST (static source code analysis), DAST (dynamic runtime testing), and manual penetration testing. We test native apps, hybrid apps (React Native, Flutter, Cordova), and WebView-based applications — including those with root detection and certificate pinning.

APK Reverse EngineeringSAST AnalysisDAST Runtime Root Detection BypassADB TestingSharedPreferences SQLite DatabasesIntent AnalysisProGuard Check Firebase SecurityWebView TestingBroadcast Receivers
🍎

iOS Penetration Testing

Comprehensive iOS security testing using static analysis of the IPA binary, dynamic analysis via Frida and Objection, and expert manual testing of business logic, authentication, and data storage. We test Swift and Objective-C apps, including those with jailbreak detection and certificate pinning implementations.

IPA Static AnalysisFrida/ObjectionKeychain Analysis Jailbreak BypassNSUserDefaultsBinary Protections URL Scheme AbuseATS ConfigurationPasteboard Leaks Touch/Face ID BypassSwift/ObjC ReviewiCloud Backup
Testing Methodology

The right mix of SAST, DAST & Manual

Automated tools find surface-level issues. Manual testing finds everything else. We combine all three testing approaches to leave no vulnerability undiscovered.

🔬

Static Analysis (SAST)

Source code and binary analysis without running the app. We decompile APKs and analyze IPA binaries to find hardcoded secrets, API keys, insecure cryptography, improper data storage, and vulnerable third-party libraries before runtime.

Hardcoded secrets Weak crypto Insecure storage
Finds 40% of all vulnerabilities

Dynamic Analysis (DAST)

Runtime testing while the app is running — intercepting network traffic, testing API endpoints, probing authentication flows, analyzing runtime memory, and simulating real attack scenarios against a live application environment.

Network interception Auth testing Runtime analysis
Finds runtime vulnerabilities
👤

Manual Penetration Testing

Certified security engineers manually test business logic, privilege escalation, payment bypass, session management, and complex attack chains that automated tools can't replicate — including custom exploitation of app-specific functionality.

Business logic Payment bypass Privilege escalation
Finds what automation misses
OWASP Mobile Top 10

We test every OWASP Mobile risk
and the ones they don't list

Every test case is aligned to OWASP Mobile Top 10 (2024), MASVS (Mobile Application Security Verification Standard), and MASTG (Mobile Application Security Testing Guide).

M1

Improper Credential Usage

Hardcoded credentials, API keys, tokens embedded in code or app bundles. We extract and analyze every string in your APK/IPA for sensitive data leakage.

M2

Inadequate Supply Chain Security

Vulnerable third-party SDKs, untrusted libraries, and supply chain risks in your mobile app dependencies. We audit every library for known CVEs and misconfigurations.

M3

Insecure Authentication & Authorization

Weak login mechanisms, missing re-authentication for sensitive actions, improper session management, JWT vulnerabilities, and role-based access control bypass.

M4

Insufficient Input/Output Validation

Injection vulnerabilities through mobile-to-backend API calls, client-side validation bypass, SQL injection via mobile forms, and XSS in WebView components.

M5

Insecure Communication

Missing or bypassable SSL/TLS certificate pinning, cleartext HTTP transmission, weak cipher suites, and man-in-the-middle attack surface in network communications.

M6

Inadequate Privacy Controls

PII exposure in logs, backups, and analytics. Excessive permissions beyond app functionality. Sensitive data in screenshots, recents cache, and clipboard contents.

M7

Insufficient Binary Protections

Lack of obfuscation, missing root/jailbreak detection, absent anti-tampering controls, and reverse engineering vulnerabilities exposing business logic in binaries.

M8

Security Misconfiguration

Debug flags left enabled in production, permissive Android manifests, overly broad iOS entitlements, exposed backup data, and insecure Firebase/cloud storage config.

M9

Insecure Data Storage

SQLite database encryption gaps, insecure SharedPreferences (Android), unprotected Keychain entries (iOS), sensitive data in logs, temp files, and unencrypted backups.

M10

Insufficient Cryptography

Weak encryption algorithms (DES, RC4, MD5), insecure key storage, hardcoded encryption keys, improper IV/salt usage, and broken cryptographic implementations.

Our Process

From APK/IPA to certificate
in 5 structured phases

01

App Submission & Setup

Upload your APK or IPA securely. We configure the test environment, set up proxy tools, enable developer mode, and establish rules of engagement.

02

SAST — Static Analysis

Decompile binary, analyze source code, extract secrets, map third-party libraries, review permissions, and identify insecure configurations without running the app.

03

DAST — Dynamic Testing

Launch the app, intercept traffic, test all API endpoints, probe authentication, analyze runtime behavior, and simulate real attacker interactions.

04

Manual Pentest

Certified experts test business logic, payment flows, privilege escalation, and complex attack chains that no automated tool can replicate.

05

Report & Certificate

CVSS-scored report with video PoCs, reproduction steps, and fix guidance. Two free retests. Publicly verifiable mobile pentest certificate on completion.

01
Reverse Engineering

We go inside your app —
byte by byte

Our security engineers decompile your APK or IPA to analyze the raw binary code. We extract embedded credentials, map data flows, identify insecure API calls, and reconstruct attack surfaces that are invisible to surface-level scanners.

  • APK decompilation (jadx, apktool) + IPA binary analysis (Hopper, Ghidra)
  • Hardcoded secrets scan — API keys, tokens, encryption keys, credentials
  • Library CVE audit — every third-party dependency checked against known vulnerabilities
  • Obfuscation analysis — ProGuard/R8 (Android) and Swift/ObjC binary review (iOS)
Get Mobile Pentest →
SAST scan — com.yourapp.android
Static Analysis Findings
Hardcoded API key (Google Maps)
MainActivity.java:147 · GOOGLE_API_KEY=AIza...
CRITICAL
AWS credentials in assets/config
config.properties · AWS_SECRET_ACCESS_KEY
CRITICAL
Vulnerable library: okhttp 3.8.1
CVE-2021-0341 · MitM via hostname verification
HIGH
SQLite DB — no encryption
/data/data/com.yourapp/databases/user.db
HIGH
🔍 23 additional findings in SAST report — view all
02
Runtime Testing

Attack the app
while it's running

Dynamic testing catches vulnerabilities that only appear at runtime — insecure network calls, session management flaws, authentication bypass, and runtime memory exposure. We use Frida, Burp Suite, and custom tools to instrument and attack your live app.

  • Traffic interception — all HTTP/HTTPS API calls analyzed with Burp Suite + MITM proxy
  • Certificate pinning bypass — Android (TrustManager) and iOS (NSURLSession) bypassed with Frida
  • Runtime memory analysis — sensitive data exposure in live app memory dumps
  • API endpoint fuzzing — every mobile API tested for injection, BOLA, and auth flaws
Book a Demo →
DAST runtime — Frida instrumentation
# Bypass SSL pinning
frida -U -n com.yourapp --codeshare
→ Certificate pinning bypassed ✓

# Intercept auth token
GET /api/v2/user/profile
Authorization: Bearer [JWT]
→ alg:none accepted — CRITICAL
JWT alg:none bypass
/api/v2/user/profile · No signature validation
CRITICAL
Insecure direct object reference
/api/users/[id]/data · BOLA confirmed
HIGH
03
Compliance Reports

Compliance-ready reports
your auditors will love

Every mobile pentest generates a comprehensive report mapped to OWASP MASVS, SOC 2, ISO 27001, HIPAA, PCI-DSS, and GDPR requirements. Engineering reports with code-level fix guidance, plus executive summaries for leadership and board-level stakeholders.

  • MASVS/MASTG-aligned — every finding mapped to OWASP Mobile verification levels
  • Video PoC for every finding — screen recordings showing exact exploitation steps
  • 2 free retests — verify every fix before closing findings
  • Verifiable certificate — publicly shareable with app store, investors, enterprise customers
Compliance Coverage — Mobile Pentest
📱OWASP MASVS L1 & L2
✓ Covered
🔒SOC 2 Type II
✓ Covered
📜ISO 27001 Annex A
✓ Covered
💳PCI-DSS (mobile payments)
✓ Covered
⚕️HIPAA (mobile health apps)
✓ Covered
Hardcoded Credentials
Insecure Data Storage
SSL Pinning Bypass
Root/Jailbreak Detection Bypass
JWT Vulnerabilities
BOLA / IDOR
Reverse Engineering
Insecure Communication
Authentication Bypass
Business Logic Flaws
Payment Gateway Bypass
MASVS Controls
Third-party SDK Risks
Deep Link Abuse
Clipboard Data Leak
By The Numbers

Mobile security facts that matter

250+
Mobile-specific test cases per engagement
7–10
Business days from app submission to report
3+
Testing methodologies combined (SAST, DAST, Manual)
0
False positives — every finding manually verified
What Customers Say

What mobile dev teams say about
Astrolabe Mobile Pentesting

"

Astrolabe's mobile pentest found hardcoded AWS credentials inside our Android APK that had been in production for 6 months. The SAST analysis was extraordinarily thorough — they decompiled our app and traced every data flow. Zero false positives, just real findings with immediate impact.

RK
Rahul Kumar
CTO, FinTech Mobile App
"

The combination of SAST, DAST, and manual testing gave us complete confidence. They bypassed our iOS certificate pinning with Frida, intercepted our payment API calls, and found a JWT alg:none bypass our entire security team had missed. The video PoCs made escalation effortless.

AT
Amy Torres
Security Lead, Healthcare App
"

Our App Store submission required a security assessment. Astrolabe delivered within 8 days — the publicly verifiable certificate gave our enterprise customers the assurance they needed. The MASVS-mapped report satisfied our ISO 27001 auditor without a single question asked.

JP
James Park
VP Product, B2B SaaS Mobile
FAQ

Frequently asked questions

For Android: submit your APK file (debug or release build — we can work with both, though release is preferred for production accuracy). For iOS: submit your IPA file. We support both debug and release builds, and can work with apps that have jailbreak detection or certificate pinning — our team bypasses these as part of the security assessment. We also accept test accounts with relevant permissions configured.
A standard mobile app penetration test takes 7–10 business days from app submission to final report delivery. This covers SAST analysis (days 1–2), DAST runtime testing (days 3–5), manual expert testing (days 6–8), and report writing with review (days 9–10). Complex apps with multiple modules may take up to 14 business days. We always agree on a firm timeline before starting.
Yes. We can test both Android (APK) and iOS (IPA) versions of your app in a single engagement. Multi-platform engagements are scoped separately but run concurrently, with a consolidated report covering both platforms. We also highlight any platform-specific differences in vulnerability severity and remediation approach.
We test all mobile app types — native Android (Kotlin/Java) and iOS (Swift/Objective-C), cross-platform apps (React Native, Flutter, Xamarin, Cordova/Ionic), hybrid apps, and WebView-based applications. For fintech, healthtech, and e-commerce apps, we include payment gateway testing, PII exposure analysis, and compliance-specific test cases alongside standard OWASP Mobile coverage.
Yes — and we recommend it. Bypassing certificate pinning and root/jailbreak detection is a core part of our mobile pentest. We use Frida, Objection, and custom scripts to instrument the app at runtime. If your app's protections can be bypassed by a skilled attacker, we'll demonstrate it with a video PoC and provide guidance on hardening those protections.
Our mobile pentest report is mapped to OWASP MASVS (L1 and L2), SOC 2 Type II, ISO 27001 Annex A, PCI-DSS (for apps handling payment card data), HIPAA (for health apps), and GDPR Article 32. We provide a compliance evidence section in the report that auditors can reference directly without additional documentation from your team.
Vulnerability scanning is automated and only identifies known, signature-based issues. Mobile penetration testing goes far deeper — our engineers actively exploit vulnerabilities, chain multiple weaknesses together, bypass app protections, test business logic (payment bypass, account takeover, privilege escalation), and demonstrate real attack impact. Scanning is a checkbox exercise. Pentesting is real security validation.
Yes. Every mobile pentest engagement includes 2 free retests within 30 days of the initial report. After applying fixes, submit your updated APK/IPA and our pentesters re-verify each finding within 3–4 business days. If all critical and high findings pass retesting, we issue your publicly verifiable mobile pentest certificate.
Mobile app pentest pricing depends on scope: app complexity, number of features, platforms (Android, iOS, or both), and compliance requirements. Typical engagements range from $4,000 to $15,000 for a single platform. Multi-platform and compliance-specific engagements are quoted separately. Contact our sales team for a detailed scope review and firm quote within 24 hours.
Start Your Mobile Pentest

Ready to secure your
Android & iOS app?

Get a comprehensive mobile penetration test — SAST + DAST + manual expert testing. MASVS-aligned report, video PoCs, free retests, and a publicly verifiable certificate on completion.

Get Mobile Pentest Quote → Talk to Sales ›

✓ Android & iOS · ✓ SAST + DAST + Manual · ✓ OWASP MASVS · ✓ Verifiable certificate