Tuesday, January 28, 2025
HomeAndroidAndroid Application Penetration Testing - Part 7

Android Application Penetration Testing – Part 7

Published on

SIEM as a Service

Follow Us on Google News

In the Last Part, Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP 10.

INSECURE LOGGING- ADB Logcat:

Logcat is a command-line tool that dumps a log of system messages, including stack traces when the device throws an error and messages that you have written from your app with the Log class.

Android Logcat allows you to:

  • View, filter, and collect all application logs
  • View, filter, and collect all system logs such as the garbage collector events
  • Retrieve all unexpected errors that have occurred

Sometimes when you are logging into the application. Those credentials can be found in logs.

Mitigation: adb logcat -c” (This clears the logs.) But make sure while coding an application credentials should not be displayed in logs.

Insecure external and internal storage

As we already know all data of the application in the device can be found in the/data/data directory and all applications (apk files) in device can be found in the/data/app directory.

When you have a rooted device you can go in-depth to see which kinds of files are stored in these directories.

Internal Storage

Internal storage is another way of storing data in Android apps. Developers can store data in Android applications locally in various ways

Examples

Shared preferences, files, Cache, SQLite databases, lib, log files, Binary data stores, cookie stores, etc.

Shared Preferences

“Shared Preferences” allows a developer to save and retrieve persistent key-value pairs of primitive data types such as Booleans, floats, ints, longs, and strings.

Shared preferences are created in Android applications using the Shared Preferences class.

Sq-lite Databases

Sq-lite databases are lightweight file-based databases. They usually have the extension “.db” or “.sq-lite”. Android provides full support for Sq-lite databases.

Databases we create in the application will be accessible to any class in the application. Other apps cannot access them.

External Storage

SDCARD is another important location in Android where we can store data associated with our applications. Files created on external storage are globally readable and writable.

Because external storage can be removed by the user and also modified by any application, you should not store sensitive information using external storage.

Mitigation:

  • For local storage, the enterprise Android device administration API can be used to force encryption to local files stores “set storage encryption”
  • Ensure any shared preferences properties are NOT_MODE_WORLD_READABLE unless explicitly required for information sharing between apps
  • For SD CARD storage some security can be achieved via the ‘javax.crypto’ library.

Insecure Communication

Lack of Certificate Inspection: Android Application fails to verify the identity of the certificate presented to it. Most of the applications ignore the warnings and accept any self-signed certificate presented. Some Applications instead pass the traffic through an HTTP connection.

Weak Handshake Negotiation: The application and server perform an SSL/TLS handshake but use an insecure cipher suite which is vulnerable to MITM attacks. So any attacker can easily decrypt that connection.

Privacy Information Leakage: Most of the time it happens that Applications do authentication through a secure channel but rest all connections through non-secure channels.

That doesn’t add to the security of the application because rest sensitive data like session cookies or user data can be intercepted by a malicious user.

Mitigation:

  • Use certificates signed by a trusted CA provider and consider certificate pinning for security-conscious applications.
  • Apply SSL/TLS to transport channels that the mobile app will use to transmit sensitive information, session tokens, or other sensitive data to a backend API or web service.
  • Only establish a secure connection after verifying the identity of the endpoint server using trusted certificates in the key chain.

Other Parts :

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam is multi-stage malware disguised as a fake “Telegram Premium” app that steals data...

Android Security Updates: Patch for Critical RCE Vulnerabilities

The January 2025 Android Security Bulletin has issued important updates regarding critical vulnerabilities that...

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...