SQL Injection
|
Content Providers |
100 |
|
Clipboard
|
Insecure Data Storage |
100 |
|
Internal Storage
|
Insecure Data Storage |
100 |
|
Shared Preferences
|
Insecure Data Storage |
100 |
|
BusyBox Binary
|
Root Detection |
100 |
|
Su Binary
|
Root Detection |
100 |
|
Su Exists
|
Root Detection |
100 |
|
UDP Traffic
|
Non-HTTP Traffic |
100 |
|
TCP Traffic
|
Non-HTTP Traffic |
100 |
|
SQLite Databases (Unencrypted)
|
Insecure Data Storage |
100 |
|
S3 bucket misconfiguration
|
Web Application |
100 |
|
Caesar Cipher
|
Encryption |
100 |
|
Error Logs
|
Logs |
100 |
|
Warnings Logs
|
Logs |
100 |
|
Debug Logs
|
Logs |
100 |
|
Verbose Logs
|
Logs |
100 |
|
WTF Logs
|
Logs |
100 |
|
Informational Logs
|
Logs |
100 |
|
HTTPS Traffic
|
HTTP Traffic |
100 |
|
HTTP Traffic
|
HTTP Traffic |
100 |
|
Sanity Check Flag
|
Sanity Check |
0 |
|