WhiteHat Security this week launched a new assessment tool to find vulnerabilities in mobile applications.
Businesses can test mobile applications with WhiteHat Sentinel Mobile application to assess, verify, and report code-level flaws, WhiteHat Security said Wednesday. Organizations can efficiently evaluate “all facets of in-house and third-party mobile applications” without having to stop and consider what hardware platform or operating system the mobile device is running, according to the company. WhiteHat Sentinel Mobile can scan scan iOS, Android and other mobile platforms right from launch.
The majority of mobile application problems actually can be found in the server and go undetected for a period of time, creating even more attack surfaces to exploit, Jerry Hoff, vice-president of the source code analysis division at WhiteHat Security, said in a statement. WhiteHat is using its Sentinel technology to test applications on smartphones, tablets and server-side components to mitigate business risk, Hoff said.
“WhiteHat Sentinel Mobile includes the assessment of the source code of the mobile application and an assessment of the runtime interactions of the mobile application as it interacts with the remote server/site,” Hoff told SecurityWeek. “WhiteHat Sentinel Mobile is designed to assess the source code of the mobile application as well as the app’s runtime interaction as it communicates with the remote server or site,” Hoff explained.
The scanner evaluates both device and server-side code, performs static and dynamic scanning, and correlates the results. Sentinel Mobile not only looks at the source code, but how the app interacts with the remote serer, Hoff added.
“The success of mobile and tablets have demonstrated unequivocally that businesses and the public will be gradually migrating away from multi-purpose computers towards these types of devices,” Stephanie Fohn, CEO of WhiteHat Security said in a statement.
When it comes to scanning mobile applications, the OWASP Top 10 list of common programming mistakes for desktop systems, still apply. The list, in no particular leader, includes: Insecure Data Storage, Weak Server Side Controls, Insufficient Transport Layer Protection, Client Side Injection, poor Authentication/Authorization, improper session handling, and Side Channel Data leakage, security devices unable to use USB pens, and broken cryptography, Hoff said.
Users should also make sure the apps are tested for the following: Directory and File Structure Analysis, Configuration Analysis, Application permissions model, Encryption APIs and hardware-supported encryption capabilities, security of networking communications and data transmissions, and insufficient authorization.
“Mobile web application security assessment can also unearth relevant web application security techniques combined with assessment techniques specific to mobile platforms,” WhiteHat said.
Organizations can view a unified dashboard, which lists information about mobile, native and Web application security posture among employees as well as across the industry.
Sentinel Mobile is available today as a stand-alone offering or as an addition to existing WhiteHat Sentinel deployments. “Mobile application security has seen too much confusion and fragmentation and not enough focus on where the heart of security problems truly lie,” Hoff said.