Challenges
Search…
⌃K
Introduction
InsecureShop Challenges
Hardcoded Credentials
Insufficient URL Validation
Weak Host Validation
Arbitrary Code Execution
Intent Redirection (Access to Protected Components)
Unprotected Data URIs
Theft of Arbitrary files from LocalStorage
Using Components with Known Vulnerabilities
Insecure Broadcast Receiver
AWS Cognito Misconfiguration
Insecure use of FilePaths in FileProvider
Use of Implicit intent to send a broadcast with sensitive data
Intercepting Implicit intent to load arbitrary URL
Insecure Implementation of SetResult in exported Activity
Insecure Content Provider
Lack of SSL Certificate Validation
Insecure Webview Properties Enabled
Insecure Data Storage
Insecure Logging
Powered By GitBook

Insecure Data Storage

The Android application stores values in a shared preferences file within the application "shared_prefs" folder under the application data directory.
The Android application stores or persists data in unencrypted or unprotected formats on the mobile device after normal usage.
InsecureShop Challenges - Previous
Insecure Webview Properties Enabled
Next - InsecureShop Challenges
Insecure Logging
Last modified 1yr ago
Copy link