1 00:00:00,100 --> 00:00:05,780 - Hello, and welcome to the new video of Android Security and Exploitation by 2 00:00:05,780 --> 00:00:11,300 Pentester Academy. My name is Aditya and I am your course instructor for this entire 3 00:00:11,300 --> 00:00:16,320 training series. So this course is being run on securitytube-training.com as well 4 00:00:16,320 --> 00:00:26,060 as pentesteracademy.com. So this video is about the insecure data storage, which is 5 00:00:26,060 --> 00:00:32,680 present in the DIVA application. So in the previous video, we had a look at how an 6 00:00:32,680 --> 00:00:36,790 Android application stored the information in something known as a shared 7 00:00:36,790 --> 00:00:42,950 preferences. So if we come to this particular challenge--the challenge II of 8 00:00:42,950 --> 00:00:51,480 insecure data storage-- we'll notice that it's a similar screen, it's asking to 9 00:00:51,480 --> 00:00:56,510 enter third party user name and password. And it's storing it somewhere in the file 10 00:00:56,510 --> 00:01:06,150 system. So let me just go ahead and enter something. So let's see testuser 11 00:01:06,150 --> 00:01:16,480 password123. I'll just save it. Go to adb shell. Go to the 12 00:01:16,480 --> 00:01:26,420 /data/data/jakhar.aseem.diva and look over here. So now an application can store 13 00:01:26,420 --> 00:01:33,930 something in shared preferences or the databases as well. And apart from that, an 14 00:01:33,930 --> 00:01:39,740 application can also store something in the external storage. So let's simply look 15 00:01:39,740 --> 00:01:48,310 at databases and see if we find something. In databases we have the divanotes.db and 16 00:01:48,310 --> 00:01:57,090 the ids2. So if we analyze the divanotes.db first, using SQLite 3, we 17 00:01:57,090 --> 00:02:07,070 look at the .tables.there's a table called notes and if you look at the notes table, 18 00:02:07,070 --> 00:02:13,430 it has all this bunch of information which is not useful for us. Simply exit this, 19 00:02:13,430 --> 00:02:23,363 and analyze the other database, which is the ids2. So SQLite 3 ids2. And if we look 20 00:02:23,363 --> 00:02:33,509 at the .tables, there is a myuser table over here. Select start from myuser we get 21 00:02:33,509 --> 00:02:41,300 the testuser and password123, which is what we saved over here. So SQLite 22 00:02:41,300 --> 00:02:45,620 databases are another way in which an Android application can store something 23 00:02:45,620 --> 00:02:51,460 sensitive. And you will often find a lot of information storing the odd token, 24 00:02:51,460 --> 00:02:58,220 cookies and these kind of other information in the SQLite databases. So 25 00:02:58,220 --> 00:03:15,210 that is all for this short video. And it should be actually, the databases, the 26 00:03:15,210 --> 00:03:30,650 database over here. Created with ids2. So that's all for this video. I hope you 27 00:03:30,650 --> 00:03:34,470 liked the video. If you have any feedback or queries, please feel free to reach out 28 00:03:34,470 --> 00:03:39,000 to me at adi@attify.com. Thanks.