esChecker

esChecker

Category: Mobile
License: Commercial

esChecker is a Dynamic Application Security Testing (DAST) tool for mobile applications that executes security tests on real devices rather than emulators.

The platform identifies vulnerabilities in Android APK and iOS IPA files through runtime analysis, producing actionable results with minimal false positives.

What is esChecker?

esChecker addresses a fundamental limitation of mobile security testing: emulator-based analysis misses vulnerabilities that only manifest on actual hardware.

Many mobile applications implement emulator detection to prevent analysis, and certain security issues related to hardware security modules, secure enclaves, and device-specific APIs only appear on physical devices. esChecker maintains a farm of real Android and iOS devices that execute applications under controlled conditions.

The platform targets security teams at financial institutions, healthcare organizations, and enterprises with stringent mobile security requirements.

Rather than replacing manual penetration testing, esChecker automates routine security checks to free up security professionals for deeper analysis.

Key Features

Real Device Testing

The core differentiator is execution on physical mobile hardware.

This approach provides:

  • Accurate results unaffected by emulator detection mechanisms
  • Testing of hardware-backed security features like Secure Enclave and TrustZone
  • Realistic network and sensor behavior
  • Coverage of device-specific vulnerabilities

User Journey Recording

Security testers can record interaction sequences that guide the scanner through application workflows.

This enables testing of functionality behind authentication or complex navigation paths.

Recorded Journey Example:
1. Launch application
2. Tap "Sign In" button
3. Enter test credentials
4. Navigate to "Account Settings"
5. Access "Payment Methods"
6. Return to home screen

Recorded journeys ensure the scanner reaches critical functionality that automated crawling might miss, such as payment flows, sensitive data screens, and administrative features.

OWASP Preset Campaigns

esChecker includes preconfigured testing campaigns aligned with OWASP Mobile Application Security Verification Standard (MASVS) categories:

CampaignFocus Areas
BankingEncryption, certificate pinning, secure storage, session management
HealthcarePHI protection, HIPAA controls, data encryption at rest
GamingAnti-cheat bypass, in-app purchase security, user data protection
GeneralOWASP Mobile Top 10 coverage

Intelligent Result Analysis

The platform includes contextual analysis to distinguish actual vulnerabilities from benign findings.

It recognizes common UI patterns, error messages, and expected application behaviors to minimize noise in results.

Reports reflect genuine security issues rather than theoretical risks.

How to Use esChecker

Testing Workflow

  1. Upload Binary: Submit your APK or IPA file through the web interface
  2. Record User Journeys: Optionally capture interaction sequences for thorough coverage
  3. Select Campaign: Choose a preset profile matching your application category
  4. Configure Parameters: Set credentials, environment variables, and test scope
  5. Execute Scan: Launch testing on the real device farm
  6. Review Results: Reports generate within 20-30 minutes

Uploading Applications

# Upload via API
curl -X POST "https://eschecker.eshard.com/api/v1/applications" \
  -H "Authorization: Bearer YOUR_API_TOKEN" \
  -F "[email protected]" \
  -F "name=MyBankingApp" \
  -F "platform=android"

Starting a Scan

# Initiate security scan
curl -X POST "https://eschecker.eshard.com/api/v1/scans" \
  -H "Authorization: Bearer YOUR_API_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "application_id": "app_123",
    "campaign": "banking",
    "journey_id": "journey_456"
  }'

Integration

GitHub Actions

name: Mobile Security Scan
on:
  release:
    types: [created]

jobs:
  eschecker-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Build Android App
        run: ./gradlew assembleRelease

      - name: Upload to esChecker
        id: upload
        run: |
          APP_ID=$(curl -X POST "https://eschecker.eshard.com/api/v1/applications" \
            -H "Authorization: Bearer ${{ secrets.ESCHECKER_TOKEN }}" \
            -F "file=@app/build/outputs/apk/release/app-release.apk" \
            | jq -r '.id')
          echo "app_id=$APP_ID" >> $GITHUB_OUTPUT

      - name: Run Security Scan
        run: |
          curl -X POST "https://eschecker.eshard.com/api/v1/scans" \
            -H "Authorization: Bearer ${{ secrets.ESCHECKER_TOKEN }}" \
            -H "Content-Type: application/json" \
            -d '{"application_id": "${{ steps.upload.outputs.app_id }}", "campaign": "general"}'

GitLab CI

mobile-security:
  stage: security
  script:
    - |
      # Upload IPA and run scan
      APP_ID=$(curl -X POST "https://eschecker.eshard.com/api/v1/applications" \
        -H "Authorization: Bearer $ESCHECKER_TOKEN" \
        -F "file=@build/MyApp.ipa" \
        -F "platform=ios" | jq -r '.id')

      curl -X POST "https://eschecker.eshard.com/api/v1/scans" \
        -H "Authorization: Bearer $ESCHECKER_TOKEN" \
        -d '{"application_id": "'$APP_ID'", "campaign": "healthcare"}'
  only:
    - tags
  artifacts:
    reports:
      junit: eschecker-results.xml

esCoaching Training

eshard offers companion training programs covering:

  • Android and iOS reverse engineering fundamentals
  • Advanced mobile security assessment techniques
  • Cryptography analysis for mobile applications
  • Hands-on penetration testing scenarios

Training sessions combine esChecker platform instruction with broader mobile security skills development.

When to Use esChecker

esChecker suits organizations with high-value mobile applications where security accuracy matters more than scan volume.

The real-device approach eliminates false positives from emulator artifacts while catching vulnerabilities that emulator-based tools miss.

Consider esChecker when you need:

  • Testing applications with emulator detection or anti-tampering measures
  • Compliance validation for regulated industries like finance or healthcare
  • Accurate results without manual false positive triage
  • Coverage of hardware security features like Secure Enclave

Teams with many low-risk applications or those seeking free tooling may prefer open-source alternatives like MobSF for initial assessments. esChecker works best as a thorough validation step for production releases rather than continuous development scanning.