Reader small image

You're reading from  Mobile Application Penetration Testing

Product typeBook
Published inMar 2016
Reading LevelIntermediate
PublisherPackt
ISBN-139781785883378
Edition1st Edition
Languages
Tools
Right arrow
Author (1)
Vijay Kumar Velu
Vijay Kumar Velu
author image
Vijay Kumar Velu

Vijay Kumar Velu is a passionate information security practitioner, author, speaker, investor, and blogger. He has 16+ years of IT industry experience, is a licensed penetration tester and is specialized in providing technical solutions to diverse cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications, including CEH, ECSA, and CHFI. He has authored a few books on penetration testing: Mastering Kali Linux for Advanced Penetration Testing – Second & Third Editions, and Mobile Application Penetration Testing. For the community, Vijay serves as the chair member of NCDRC, India. When not working, he enjoys playing music and doing charity work.
Read more about Vijay Kumar Velu

Right arrow

Storage/archive analysis


The data at rest is a very critical part of the assessment. Our usual concern remains that our application data is securely stored on our Android devices so that no one can extract data from it in the case of theft or loss. Also, an application (malicious) cannot access the data of another application (such as banking).

Our target app is FourGoats. All the app data resides in /data/data/org.owasp.goatdroid.FourGoats in an Android device. In this app folder, we can see that there is a shared_prefs folder, a database folder, and several other folders installed by the app. In the following screenshot, you can see that all the files in the shared_prefs folder of the FourGoats app are world-readable:

This means that any app that is installed on the device will have access to read these files even on non-rooted devices. Sometimes, developers also store credentials including usernames, passwords, and PIN numbers in such files, which will lead to a complete compromise of user...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mobile Application Penetration Testing
Published in: Mar 2016Publisher: PacktISBN-13: 9781785883378

Author (1)

author image
Vijay Kumar Velu

Vijay Kumar Velu is a passionate information security practitioner, author, speaker, investor, and blogger. He has 16+ years of IT industry experience, is a licensed penetration tester and is specialized in providing technical solutions to diverse cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications, including CEH, ECSA, and CHFI. He has authored a few books on penetration testing: Mastering Kali Linux for Advanced Penetration Testing – Second & Third Editions, and Mobile Application Penetration Testing. For the community, Vijay serves as the chair member of NCDRC, India. When not working, he enjoys playing music and doing charity work.
Read more about Vijay Kumar Velu