EVABS Challenge 6

$adb shellvbox86p:/data/data/com.revo.evabs/databases # ls $adb pull /data/data/com.revo.evabs/databases/MAINFRAME_ACCESS . $ ls $ file MAINFRAME_ACCESS EVABS{sqlite_is_not_safe}

EVABS Challenge 5

$ adb shellvbox86p:/data/data/com.revo.evabs # ls vbox86p:/data/data/com.revo.evabs # cd shared_prefsvbox86p:/data/data/com.revo.evabs/shared_prefs # ls vbox86p:/data/data/com.revo.evabs/shared_prefs # cat DETAILS.xml EVABS{shar3d_pr3fs_c0uld_be_c0mpromiz3ds}

EVABS Challenge 4


EVABS Challenge 3

EVABS Challenge 2


EVABS (Extremely Vulnerable Android Labs) Challenge 1

According to An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners. The effort is to introduce beginners with very limited or zero knowledge to some of the major and commonly found real-world based Android application vulnerabilities in a story-based, interactive model. EVABS follows a level-wise difficulty approach and in each level, the player learns a new

Mobile Security Framework (MobSF)

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF Documentation: Linux requirements: Install Git: sudo apt-get install git Install Python 3.8-3.9: sudo apt-get install python3.8 Install JDK 8+: sudo apt-get install openjdk-8-jdk Install the following dependencies:sudo apt install python3-dev python3-venv python3-pip build-essential libffi-dev libssl-dev libxml2-dev libxslt1-dev libjpeg8-dev zlib1g-dev wkhtmltopdf For the