MASTG walkthrough - OMTG_DATAST_001_InternalStorage

The intent here is to show that storing data on the device itself can lead to disclosure of data. Usage of internal storage should not be used for sensitive information.

datast_001_int_1

Take a look at the source code

datast_001_int_2

Line 37 indicates that we should look for a file called “test_file” in the internal storage (/data/data/sg.vp.owasp_mobile.omtg_android) of the application.

Connect to the target device via adb and use find

adb shell
find / -name ‘test_file’ -type f 2>/dev/null

datast_001_int_3

Tools used

Thoughts? Leave a comment