Challenges
Search…
⌃K
Introduction
InsecureShop Challenges
Hardcoded Credentials
Insufficient URL Validation
Weak Host Validation
Arbitrary Code Execution
Intent Redirection (Access to Protected Components)
Unprotected Data URIs
Theft of Arbitrary files from LocalStorage
Using Components with Known Vulnerabilities
Insecure Broadcast Receiver
AWS Cognito Misconfiguration
Insecure use of FilePaths in FileProvider
Use of Implicit intent to send a broadcast with sensitive data
Intercepting Implicit intent to load arbitrary URL
Insecure Implementation of SetResult in exported Activity
Insecure Content Provider
Lack of SSL Certificate Validation
Insecure Webview Properties Enabled
Insecure Data Storage
Insecure Logging
Powered By GitBook

Insecure Logging

The class com.insecureshop.LoginActivity contains the following code:
android.util.Log.d("userName", username);
android.util.Log.d("password", password);
This implies the user credentials are logged within the Logcat when the user logs into the account.
InsecureShop Challenges - Previous
Insecure Data Storage
Last modified 1yr ago
Copy link