LAB - Mobile Vulnerabilities: SQLi in Android

In this lab environment, you will get access to a Debian machine, which has all the required tools installed on it for this lab, along with an Android emulator. To start the Android emulator, run the "startemulator.sh" script present at "/root/Desktop."

Objective: Identify and exploit the SQLi vulnerability in the vulnerable APK.

The following Android application can be useful:

  • allsafe.apk: Intentionally vulnerable Android application. (Pre-installed on the emulator).


After execute the APK, we can see a login and into this we can try SQLi, execute and get credentials confirm that the SQLi exist -->

After that, we can inspect the source code and see the variable to execute it login -->

Last updated