Awards
Solves
Challenge | Category | Value | Time |
Backdoor5 | Miscellaneous | 100 | |
Backdoor4 | Miscellaneous | 100 | |
Backdoor3 | Miscellaneous | 100 | |
Backdoor2 | Miscellaneous | 100 | |
Backdoor1 | Miscellaneous | 100 | |
Backdoor6 | Miscellaneous | 100 | |
RPATH | Binary Protection | 100 | |
Hardcoded Secret | Binary Protection | 100 | |
File System Expose | Content Providers | 100 | |
SQL Injection | Content Providers | 100 | |
Clipboard | Insecure Data Storage | 100 | |
Memory | Insecure Data Storage | 100 | |
External Storage | Insecure Data Storage | 100 | |
Internal Storage | Insecure Data Storage | 100 | |
Shared Preferences | Insecure Data Storage | 100 | |
SQLite Databases (Unencrypted) | Insecure Data Storage | 100 | |
WTF Logs | Logs | 100 | |
Verbose Logs | Logs | 100 | |
Debug Logs | Logs | 100 | |
Warnings Logs | Logs | 100 | |
Error Logs | Logs | 100 | |
Informational Logs | Logs | 100 | |
Sanity Check Flag | Sanity Check | 0 |