Mobile Application Pentesting-Part 3

Piyush Patil
May 18, 2019 · 4 min read

Insecure Data Storage

PART-2

As we discussed earlier, storing sensitive data as a plain text is completely insecure. This is the second task that shows data leakage risk in Android applications.

To keep reading this story, create a free account.

Already have an account? Sign in

Piyush Patil

Written by

Reverse Engineering, Penetration Testing( Web, Mobile, IoT, Network, Infra)

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade