latest articles

Best Practices For Mobile Device Testing

Photo by freestocks on Unsplash

Mobile testing is done to confirm that all of its features, including its hardware and other software components, are functioning effectively. Technically speaking, it is called the mobile device quality check, which ensures that the software and hardware comply with the actual customer's needs. In testing, we test out all the hardware and software components.

Types of Mobile Device Testing

Testing of mobile devices varies from business to business. However, these are the kinds of tests usually involved in device testing.

Unit Testing

There are a couple of components a mobile device has, such as the display, charging port, vibration motor, both front and back camera. In unit testing, every component of the mobile device gets separately tested. If a faulty component is installed in the mobile phone, it becomes very costly to get the phone back to the production line to change a single component. Thus, each component gets tested separately before getting installed in the device. This includes testing whether the display is working correctly and whether the camera is behaving correctly.

Factory Testing

After the components get installed in the mobile device, the device gets tested again to find out whether all the components are working properly or not. This is done because there might be some defect in the components that get introduced during the manufacturing or assembling of the hardware. So there are various ways by which these devices get tested.


Some types are related to factory testing:

  1. Hardware testing: In this testing, various components of the hardware get tested, like the power button, display of the mobile phone, camera, sim card slot, etc. If there are any defects, the device is sent back to production to change those components.

  2. Signal receiving testing: Signal receiving tests are performed to check whether all the network access points, such as the 3G, 4G, and Wi-Fi, are working properly and are receiving good amounts of signal. This is the most important component of a mobile phone. If the phone is not able to receive any signal, calling the internet and other components will not work. It also tests to check how much signal is being received by the mobile phone.

  3. Battery charging testing: This testing is performed to verify whether the phone battery is charging correctly or if there is a defect in the charging capability.

  4. Reliability testing: Devices get tested against extreme heat and are thrown on the floor to find out how reliable they are. This is done as users might use them in extreme weather conditions or accidentally drop their phones. Therefore, it is necessary to test out the reliability of the mobile phone.

Certification Testing

This type of testing determines whether the device is suitable to launch in the market and doesn't adversely affect people's health. Devices that are potential health hazards cannot be launched because they could injure people, expose the company to lawsuits, ruin the company's image, and cost a lot to recall. Therefore, it is crucial to ensure that comprehensive certification testing is done.

Functional Testing Performed on Devices

Functional testing is

software testing that is carried out keeping in mind the functional requirements of the product. Given below are two types of functional testing.


Usability Testing

The ease of using a device is determined through usability testing. The device gets tested from the user's perspective. The camera is used to take selfies, landscape images, and other photos that a user is likely to click so that the camera quality can be tested. Other things like the call quality, the quality of the speaker and microphone, are also tested from a user's perspective. This is done so that the user doesn't have any problem using the device.

Static Code Analysis

Static code analysis is done when the mobile manufacturers have themselves developed part of the operating system. Nowadays, almost every mobile device uses Android OS, such as MIUI, Oxygen OS, etc. They actually modify some of the open source code to integrate some of their specific features, such as AI camera and other components. These apps need to be tested to ensure that they are properly integrated and functioning. Sometimes, the software may have some defects, which can cause problems like all the images getting blurred when taken with that feature.


There are a lot of different testing approaches that are followed by companies apart from functional testing. They do have their own testing methods, which they use to perform various types of tests. These tests are performed to test out the quality of the software being installed in the phone and the hardware being used to make the phone. This is done so that the end-user doesn't have any problem, as these errors are directly connected to the company's reputation. A bad device results in a user deciding not to buy another device from the same company. Thus these tests are very necessary for the growth of the company.

Read more

Open Redirection in Oauth

Hi there,

I am fond of testing API. Whenever a bug bounty program launches their program first of all I look if they have an API or not. I have tested API of many websites like Mapbox ,Mediafire and found many issues.

Now I stumbled across a website I don't want to disclose the name of the website so lets call it Now in you can create an application and can get data from the users. They have different scope like email, phone number, address etc.

Now they are using Oauth for all this. I created an application and started testing the same.
As soon as i created the application client_id and client secret was provided to me (intended).

Now application only allows https url as the redirect_uri.  I white-listed an url and I was ready to go.

I have given the scope of email and tried the Oauth url they provided. Now what is actually going if you provide the wrong scope you will be redirected to the url given in the redirect_uri

Now according to RFC 6749

If the request fails due to a missing, invalid, or mismatching
   redirection URI, or if the client identifier is missing or invalid,
   the authorization server SHOULD inform the resource owner of the
   error and MUST NOT automatically redirect the user-agent to the
   invalid redirection URI

If the resource owner denies the access request or if the request
   fails for reasons other than a missing or invalid redirection URI,
   the authorization server informs the client by adding the following
   parameters to the query component of the redirection URI using the
   "application/x-www-form-urlencoded" format

lets take a scenario
There is a website and someone created an application with a white-listed url 

Now In the second paragraph of RFC6749 many dev misinterpret the word other than.
If the scope parameter is invalid then they directly redirect the user to that website without any interaction and thats how it works as on open redirect.

Now this can be used for phishing purposes or redirecting users to a malicious website

Now they say that this is how the Oauth works but actually if the scope is invalid then google and Facebook doesn't redirect their user to the website mentioned in redirect_uri facebook shows this type of error if the scope is invalid 

Now after all this I reported this bug to and they denied this by saying that this is how Oauth works. And after a long trail of comment they said we are going to operate our API according to RFC6749. thats it.

So everything is upto them if they want to make changes to protect their users of not.


And the mitigations that were provided by John Bradley,  Hannes Tschofenig you can found them here

Jitendra Kumar Singh(Team Computerkorner)
Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Insufficient Transport Layer Protection: Mediafire Android Application

Hi there,

It was a quite long time since I published my last post sorry for keep you waiting.

So this is a story of  a bug which I found in Mediafire android application actually 
First of all I want to clarify that I never use rooted devices since it removes the most important security(access to /data/data folder) feature.

Now lets stick to the bug.

So after testing their API and WebApplication( I found about 10+ issues there) . Now its time to take a look at their android application.
So I installed their application directly from play store and configured Burp listen all the traffic coming from my device. Now lets start testing.

I was playing with the android application from past 3-4 hours but I was not able to find any issue. Actually they are using API there which I already tested.
Now I started looking for some issue like every request that goes with session token should have to be https. Suddenly I noticed a request and it disappeared in secs from http history tab of burp.
Now I started digging as that request doesn't have the HTTPS protection.
Now after looking for sometime I figured out that whenever you preview any image within the android app this request goes out.<quick_Key_of_file>&doc_type=i&size_id=5&session_token=<session_token_here>

Now this request is not going on HTTPS and this request has the session token as well.

How to Exploit:-

Now if the victim is using a public wifi( malicious user's wifi) that malicious user can intercept the request and can takeover his account with the session. Now there is a catch as well the session token is only valid for 10 minutes and if you try to send a request after a idle time of 10 minutes you have to enter the password to re-authenticate yourself after that a new session token will be generated.
But there is an endpoint where you can renew the session token but you have to send the request before the 10 minutes idle time.<TOKEN_YOU_GOT>

Now you have everything you can takeover the user session without getting session timeout.

5 April 2016 17:25:36: Bug found
5 April 2016 17:36:37: Reported to Mediafire
7 April 2016 22:57:00: More information sent about renew the session token to bypasss the password requirement.
8 April 2016 00:52:33: Report is Triaged
8 April 2016 00:53:04: Bug is fixed
8 April 2016 (I don't remember the time ): Update issue for the Android Application.

It was my pleasure to work with Mediafire Security team as they are very fast in fixing and issuing the update.

Thats all for this post let me know you  opinion in comment section

Jitendra Kumar Singh(Team Computer Korner)

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Bypassing Private Profile Restrictions

So this post is about bypassing the private profile Restrictions on a private program on HackerOne. I will not disclose the program name so lets call it

So I got an invitation to a private program on HackerOne. I created an account on it , it was a file hosting service where you can host all your files.

I started testing it. I created an account and started doing reconnaissance on it as well.
After creating a profile. In setting there were two options Private profile and public profile.
They create a page for a user like imgur does with subdomain. Anyone can visit there and can see some basic info about the user. But if you profile is private, no one can see your profile , your profile picture etc.

So I started looking for some bypass for this private profile restrictions. 

1. If a user visits to a profile image url directly they will be able to download the profile picture of the user even the profile is private. But the image url looks like this
So it will be hard to predict this 1768280b-8a78-463a-bdb9-f1a96835f466 random alphanumeric to retrieve the profile picture of the user.
So it was a failed attempt.

2 Now when you login there is a request which goes and in its response there is a id parameter which looks like this "id":"0a7561f5-dcd0-412e-bed3-f5734da4ddbd" and if you change this with the parameter in the 1 an image will be downloaded but it was not the real image of the user.

3. So after further investigation I found that this alphanumeric value is guid of a person.
So I was testing some of the file sharing functionalities in that site.
Now I configured my burp to listen all the request and response coming from it. Whenever a person shares a file with a person who have a private account on there is a parameter in the response which leaks the person guid 


Now you can see the value in the profileImageUrl in 000 but personGuid have an interesting value. just change the 000 value with the value in personGuid and you can download the profile picture of the user.

They gave me their account email and told me that please download the profile pic of this account and i successfully did that

The team took about 1 year in fixing this issue. :( 

Thats all for this post 

Jitendra K Singh ( Team Computer Korner)

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Bug Bounty: Bypassing Account Suspension In order to get full access to account[Mediafire]

Hi there,

In this post I am going to discuss about a bug which I found on Mediafire.
I noticed that Mediafire have a bug bounty program.

What is Mediafire:- 

MediaFire is a file hosting, file synchronization, and cloud storage service based in Shenandoah, Texas, United States. Founded in June 2006 by Derek Labian and Tom Langridge, the company provides client software for Microsoft Windows, Mac OS X, Linux, Android, iOS, BlackBerry 10, and web browsers.MediaFire has 43 million registered users and attracted 1.3 billion unique visitors to its domain in 2012.

There are three types on account on Mediafire 
1. Basic (free) :- Which have some basic level features and a limited storage and Bandwidth.
2. Pro (Paid) :- It has more features as it is paid much larger bandwidth and 100GB Storage.
3. Business (Paid) :- For teams, all Mediafire features like you an add other users , you can customize download page , you can increase bandwidth, you can export folder as zip, you can download the Logs of the users.

As It requires an international credit or debit card to create a Pro or Business , so I created an Basic account for free and started looking at the functionality.

Most features like deleting files, generating one time download link etc are using the Mediafire API. So i quickly looked at the documentation of the API. You can find the Mediafire API Here.

So On login what is happening:-
Whenever you do login to your account it generates a authenticity_token. The life of token is for  10 minutes after that it renew the token using this API call
but if you session is ideal for 5-7 minutes then you have to enter the password again to renew the token. 

The Bug:-

So actually I was looking at some of their functionality but due to some work I did logout from my account. and after doing logout. It redirected me to a page which says 

This account has been locked.
See our page about account suspensions for more information.

I was like WHAT I DID WRONG ? :(

So as after sometime after completing the work. I came back and tried to login again but after redirecting me to the home page it again redirects to me on that page where it shows that the account is suspended.

Now I fired burp and started looking that what actually going on.

1. After login it generates the authenticity token and redirects to home page 
2. After verifying that this is a suspended account it redirects me to that page which shows the warning.

So I can do anything using the WebApp.
I started looking at the Mediafire API and tried one API call which is about creating a folder using API

Now I copied the authenticity token which was generated during the login and tried to create a folder and It was successful.

I can also access files etc using the Mediafire Android App.

So what is actually happening that API is generating the token but not invalidating it after confirming that the account is suspended and using the API I can access the most of the features of Mediafire.

So Now as a fix Mediafire invalidates the token as soon as they confirms that the account is suspended. and using the mobile application you can't use any features with suspended account. 

Disclosure Timeline
27-Feb-2016: Reported
9-Mar-2016: First response received > Looking at this report
14-Mar-2016: Bounty Awarded(Certificate and pro account)
15-Mar-2016: Resolved
27-Feb-2017: Disclosed

Jitendra K Singh (Team Computer Korner)

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Website Sends the Actual Password on the Mobile Number: Considered as the Severe Vulnerability or Not ?

Hi there,

I was just looking at some website which provides free SMS sending service. There are a lot of website which provides this functionality in India. 
So what is a SMS

SMS stands for Short Messaging Service. It uses standardized communication protocols to enable mobile phone devices to exchange short text messages.

There are a lots of website which you can use to send free SMS to a mobile phone all you need to create an account on your desired website and you are ready.

Now I just looked one of the website like that I am not going to mention it's name lets call it
So on you can use your mobile no to create an account they will deliver a temporary password to you on the given number and after login you have to change the password to your desired one.

Now what is going to happen if you forgot your password. So in case that you forgot your password just enter your mobile no on their password reset page and they will send the password you were using on that website , its pretty simple.
So you noticed anything which can create a risk or threat ?
Some can understand but for the others let me explain that ?

They are not using any hashing algorithm for hashing the password.
If a password is hashed then it can't be converted to the actual text you can only compare other hashes in order to guess the actual word.

Now how I identified that this website is not using any hashing algorithm ?

As I mentioned earlier that once a text is converted into hash it can't be converted back to the actual word from which the hash is generated.
 As the is sending the actual password on the mobile phone it tells us that they are not using any hashing algorithms.
As they are not using the most important security layer of password hashing. Then how you are going to trust this website maybe they are saving all the contacts you added and the message you sent in actual format giving a chance to Hackers to steal all of your info if they got access to the database of that website.

So I will suggest you that you shouldn't have to use those sites which are not providing the most common security layer to its users.

Now the decision is on you do you want to let your private information to be publicly available ? 
If not then beware !!! ..........

Have a Good Day 


Jitendra K Singh (Team Computer Korner)  

Special thanks to Moto G
Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Bug Bounty: Vulnerability In

Hi there,

First of all sorry for this long pause from my side I was busy in somethings and it took me some time to sort out all the things.

So in this post I am going to discuss about a vulnerability I found in

A light integration sends the platform customer behavior data from your web or mobile app. Then you can start sending messages based on what users do or don't do after they log in. Increase engagement, revenue, and customer success.

I was looking at SPF record of some company and i found the that some companies have in their spf record the are allowing to send emails on their behalf.
SO i directly went to and created an account.
after creating an account I created a template for sending this as an email.
Now you can add as many email account you want for sending email so I tried saving an email of a site which have in their spf record. The email address dont want to disclose the website).
the email was added succesfully but after this one problem arised that doesnt let me send the email from that second email address i have added to my account.
so there are two conditions:-

1. When creating an account you have to verify the email address.
2. You can only send the email from the email you have used while creating the account.

So i tried some ideas like sending an email capturing that request with burp and modifying the email  but these doesn't work.

While adding the email there was an option to edit my primary email. thats looks something vulnerable to I clicked on edit the email and editing my primary email to and it was successful. Now I can send the emails on the behalf of the customers of that company.

First of all I reported this to some of his customers who were vulnerable to this after that i wrote and email to and explained this to them.
they told me that they are fixing this ASAP but since they dont have an bug bounty program they are no rewarding me anything. That was fine because I dont this testing for exploring and gaining knowledge.

They send me reply >24 hour of reporting this and I was happy with their quick response.


They did two thing to fix this vulnerability first of all they blocked my account. 😁😁😁😁😁😁😁😁😁😁. and after that they added domain verification whenever you try to add an email you have to verify its ownership. 

Hope you liked it 

Jitendra K Singh(Team Computer Korner)

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more

Wi-Fi Hacking: Deauthentication Attack

Hi there,

So this post is about deauthentication attack.
So we can do a deauthentication attack without connecting to a target network.

How It works:-

So in this process aireplay-ng sends deauthenticate packets to both AP(Access Point or router) and client which is connected to it.
It sends spoof packets to AP and also some packets to client when AP acknowledges a packets which says that the target client is not authenticated to the AP. 
In other words attackers sends some deauth packets to the AP pretending to be the client and in the same time attackers send deauth packets to the client pretending to be the router saying that you need to authenticate again.

How We can do this attack:-

So we need aircrack suite to carry out this attack. lets start

  1. First of all you should have to a wireless card in monitor mode to enable this type
    airmon-ng start [Your wifi card name] and press enter it will enable a wireless card in monitor mode.
  2. Now scan all networks by typing
    airodump-ng [Your wireless card in monitor mode]
I have censored some information. after scanning network choose the AP on which you want to deauth a client. 

4. Now to deauthenicate a specific client first of all look how many clients are associated to that network to do this simply type
airodump-ng --channel [no] --bssid [mac of target network] [wifi card in monitor mode] and press enter

it will give a output like this 

5. Now to deauthenticate the client use this command
aireplay-ng --deauth [no of packets you want to send] -a [AP's MAC address] -c [client Mac address] [wifi card in monitor mode]
 if you want to deauthenticate the client for a long time you can set a large value of [no of packets] like 10000 etc.

So after this the client will be not be able to authenticate to the target network.

Hope you enjoyed reading this.
Next Post: Cracking WEP encryption Practical 

Jitendra (Team Computer Korner)

Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
Read more