DIVA

Insecure Logging

We can see the pid of the jakhar.aseem.diva is 1430.

We can view the logs of the process using logcat. At the end of the line, we can see the credit number that we entered.

Hardcoding Issues - Part I

We can see Vendor key in the source code of this apk using jadx-gui.

Insecure Data Storage Part 1

By viewing source code, we can see the credentials is stored in shared_prefs directory.

We can see the credentials in this directory /data/data/jakhar.aseem.diva.

Insecure Data Storage Part 2

In this time, the credentials are stored in SQL Database.

We can see the data are stored in the /data/data/jakhar.aseem.diva/databases.

Insecure Data Storage Part 3

By reviewing source code, the data are stored in the tmp directory.

We can check the tmp file at /data/data/jakhar.aseem.diva/uinfo-934313309tmp

Insecure Data Storage Part 4

At this time, the credentials are saved but we don't know where the data is stored? Here is a source code. It stored data on the external storage means sd card.

We can check either on the Settings>Apps>Apps Info.

We can read the data from sd card.

Input Validation Issues - Part 1

We can dump the data by using SQL injection ' OR 1=1--

Input Validation Issues - Part 2

If we check the google webpage, we can access it.

How about local files??

Access Control Issues - Part 1

We can check the api credentials through button.

Our purpose is to access from outside the app. If we run logcat, we can see ActivityManager name.

When we start the activity, the application is auto open and see the credentials.

Last updated