-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaboutSecureStore.html
50 lines (38 loc) · 1.79 KB
/
aboutSecureStore.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
<!DOCTYPE html>
<html lang="en">
<head>
<title>ABOUT Secure Store</title>
<meta charset="utf-8">
<style type="text/css">
html { background: #3E0F04; }
body { color: #FFF; font: 14px "Walt Disney", Helvetica; }
h1 { text-align: center; color: rgb(255, 255, 255); font-size: 20px; font-weight: bold; }
</style>
<script type="text/javascript">
function showDescription() {
securestore.showDescription();
}
showDescription();
</script>
</head>
<body>
<h1>Secure Store Vulnerable App</h1>
<p> Secure Store is an intentional vulnerable Android application that is created by @srini0x00 to educate developers/pentetration testers/students and anyone who is interested in Mobile Security. Most of the common Mobile App Vulnerabilities have been covered. No clues have been provided on where the vulnerabilities are located. Go, find them and break them. </p> <p>If you have any suggestions or feedback please feel free to contact us at <b>@srini0x00</b> </p>
<p>Some of the vulnerabilities covered</p>
<ul>
<li>SQL Injection in REST APIs</li>
<li>Leaking sensitive data - REST APIs</li>
<li>Insecure Direct Object References</li>
<li>Weak authorization</li>
<li>Insecure local data storage</li>
<li>Broken Cryptography</li>
<li>SQL Injection at client side</li>
<li>WebView Injection</li>
<li>Insecure Direct Object References</li>
<li>Side Channel Data Leakage</li>
<li>Insufficient Transport Layer Security</li>
<li>Developer backdoors</li>
</ul>
<p style="text-align:center">Happy Hacking!</p>
</body>
</html>