MASTG walkthrough - OMTG_DATAST_011_Memory

The intent here is to show that a memory dump can leak sensitive information like decrypted information or keys.

Take a look at the source code

datast_001_mem1

Here we have to dump the memory and identify the function (decryptString()) which was called for this activity and get the decrypted string.

datast_001_mem2

Lets fire up frida and do a memory dump with fridump

adb shell “su -c /data/local/tmp/frida-server”
frida-ps -Ua

datast_001_mem3

python3 fridump.py -U sg.vp.owasp_mobile.omtg_android -s
cd to fridump/dump
strings strings.txt | grep decrypt

datast_001_mem4

Tools used

Thoughts? Leave a comment