Memory
|
Insecure Data Storage |
100 |
|
File System Expose
|
Content Providers |
100 |
|
SQL Injection
|
Content Providers |
100 |
|
isDebugger Connected
|
Anti-Debugging |
100 |
|
Blowfish
|
Symmetric Encryption |
100 |
|
DES
|
Symmetric Encryption |
100 |
|
RC4
|
Symmetric Encryption |
100 |
|
3DES
|
Symmetric Encryption |
100 |
|
Potentially Dangerous Apps
|
Root Detection |
100 |
|
Root Cloaking Apps
|
Root Detection |
100 |
|
Test Keys
|
Root Detection |
100 |
|
BusyBox Binary
|
Root Detection |
100 |
|
Dangerous Props
|
Root Detection |
100 |
|
Su Exists
|
Root Detection |
100 |
|
Su Binary
|
Root Detection |
100 |
|
Root Management Apps
|
Root Detection |
100 |
|
Device Wi-Fi MAC
|
Device ID |
100 |
|
SSAID/ANDROID_ID
|
Device ID |
100 |
|
Native Function Call
|
Binary Protection |
100 |
|
RPATH
|
Binary Protection |
100 |
|
Hardcoded Secret
|
Binary Protection |
100 |
|
Caesar Cipher
|
Encryption |
100 |
|
HTML5 Controls
|
Web Application |
100 |
|
Hardware Specifications
|
Emulator detection |
100 |
|
Web Socket (WS)
|
WebSocket Traffic |
100 |
|
Web Socket Secure (WSS)
|
WebSocket Traffic |
100 |
|
TCP Traffic
|
Non-HTTP Traffic |
100 |
|
UDP Traffic
|
Non-HTTP Traffic |
100 |
|
Activity data
|
Insecure Data Storage |
100 |
|
Clipboard
|
Insecure Data Storage |
100 |
|
External Storage
|
Insecure Data Storage |
100 |
|
Internal Storage
|
Insecure Data Storage |
100 |
|
SQLite Databases (Unencrypted)
|
Insecure Data Storage |
100 |
|
Shared Preferences
|
Insecure Data Storage |
100 |
|
WTF Logs
|
Logs |
100 |
|
Debug Logs
|
Logs |
100 |
|
Verbose Logs
|
Logs |
100 |
|
Warnings Logs
|
Logs |
100 |
|
Error Logs
|
Logs |
100 |
|
Informational Logs
|
Logs |
100 |
|
HTTPS Traffic
|
HTTP Traffic |
100 |
|
HTTP Traffic
|
HTTP Traffic |
100 |
|
Sanity Check Flag
|
Sanity Check |
0 |
|