Big bank

EasyMobile Security

Overview

We are secure. We are Big Big Bang. Can you obtain our admin credentials? In this challenge, you'll analyze a mobile application backup to discover how sensitive information can be exposed through improper storage practices. Flag Format: Flag{username:password}

Lab Details

Prerequisites & Requirements

  • Basic knowledge of Android system architecture, file structure, and how Android applications store data.
  • Familiarity with command-line tools and basic cybersecurity concepts will be helpful.
  • No advanced programming skills are required, but understanding how mobile apps handle user data and preferences is beneficial.

What will you learn?

  • How to work with Android backup (.ab) files and understand their structure
  • Techniques for extracting and analyzing data from Android backups
  • Methods for converting Android backup files into accessible formats
  • How to navigate Android app directory structures and locate sensitive information
  • Understanding Android shared preferences and how apps store credentials
  • Basic mobile forensics and security assessment skills

Tools

  • Linux - A Linux environment (native, VM, or WSL) for running extraction commands
  • Browser - For research and documentation lookup
  • OpenSSL - For decompressing the backup file
  • dd & tar - Command-line utilities for file manipulation and extraction
  • Text editor - For examining XML and configuration files

Job Positions

Reverse Engineer

Tags

Hardcoded CredentialsInsecure Data StorageMobile Security