Meet the DIVA - by: Sandeep & Ankit

Security Researcher at Adobe, Chapter Leader at OWASP & null
Jun. 24, 2016
Meet the DIVA - by: Sandeep & Ankit
Meet the DIVA - by: Sandeep & Ankit
Meet the DIVA - by: Sandeep & Ankit
Meet the DIVA - by: Sandeep & Ankit
Meet the DIVA - by: Sandeep & Ankit
1 of 5

More Related Content

Viewers also liked

Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...
Affordable app sec for startups by - Sandeep Singh, Vaibhav Gupta and Vishal ...OWASP Delhi
IzzuddinIzzuddin
IzzuddinDinGea
Civic sportsCivic sports
Civic sportsJack740
перелік комплексних навчально тематичних екскурсійперелік комплексних навчально тематичних екскурсій
перелік комплексних навчально тематичних екскурсійbiblioteka_c
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims Meisam J Moghadam
Visualizing Critique: Strategies for Critical ReflectionVisualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionMhermano

Similar to Meet the DIVA - by: Sandeep & Ankit

Null mumbai-Android-Insecure-Data-Storage-ExploitationNull mumbai-Android-Insecure-Data-Storage-Exploitation
Null mumbai-Android-Insecure-Data-Storage-ExploitationNitesh Malviya
Code to Cloud Workshop.pptxCode to Cloud Workshop.pptx
Code to Cloud Workshop.pptxJamie Coleman
Ii 1300-java essentials for androidIi 1300-java essentials for android
Ii 1300-java essentials for androidAdrian Mikeliunas
Android application penetration testingAndroid application penetration testing
Android application penetration testingRoshan Kumar Gami
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaYogesh Ojha
Android AttacksAndroid Attacks
Android AttacksMichael Scovetta

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

办理英国圣安德鲁斯大学毕业证原版一模一样办理英国圣安德鲁斯大学毕业证原版一模一样
办理英国圣安德鲁斯大学毕业证原版一模一样uncesxy
Richard - IFIP Networking 2021 - Panel.pdfRichard - IFIP Networking 2021 - Panel.pdf
Richard - IFIP Networking 2021 - Panel.pdfRichard Renwei Li
意大利意大利罗马一大毕业证、学位证原版制作意大利意大利罗马一大毕业证、学位证原版制作
意大利意大利罗马一大毕业证、学位证原版制作vweuwx
澳洲阿伯泰邓迪大学毕业证学位证办理方法澳洲阿伯泰邓迪大学毕业证学位证办理方法
澳洲阿伯泰邓迪大学毕业证学位证办理方法gonksoe
IDNOG 8: APNIC MeasurementsIDNOG 8: APNIC Measurements
IDNOG 8: APNIC MeasurementsAPNIC
Automation Suite PPT (2).pptxAutomation Suite PPT (2).pptx
Automation Suite PPT (2).pptxRohitRadhakrishnan8

Recently uploaded(20)

Meet the DIVA - by: Sandeep & Ankit

  1.  DIVA (Damn insecure and vulnerable App) is an Android App intentionally designed to be insecure  The vulnerabilities exist from a developer’s perspective  Source: https://github.com/payat u/diva-android  Created by Aseem Jakhar
  2. Current Challenges include: ◦ Insecure Logging ◦ Hardcoding Issues – Part 1 ◦ Insecure Data Storage – Part 1 ◦ Insecure Data Storage – Part 2 ◦ Insecure Data Storage – Part 3 ◦ Insecure Data Storage – Part 4 ◦ Input Validation Issues – Part 1 ◦ Input Validation Issues – Part 2 ◦ Access Control Issues – Part 1 ◦ Access Control Issues – Part 2 ◦ Access Control Issues – Part 3 ◦ Hardcoding Issues – Part 2 ◦ Input Validation Issues – Part 3
  3. For the purpose of the walkthrough of the challenges we need the following tools: ◦ Genymotion or Android Studio AVD ◦ Dex2jar or jadx ◦ JD-GUI ◦ APKTOOL
  4. jadx –d out_folder diva.apk adb devices adb logcat adb shell cd, ls, ls –a, cat sqlite3 database_name select * from table_name;