Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases

Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This video tutorial covers the penetration of an Android machine's database using Drawsar. It begins with an overview of the setup from the previous video, including the installation of Drawsar and APK files. The tutorial then demonstrates basic commands for listing and finding packages within the Android system. The main focus is on database penetration techniques using SQL injection commands to extract sensitive information, such as usernames and passwords. The video concludes with a preview of the next topic, which involves analyzing log files to find secret information.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of the video tutorial?

Penetrating Android databases

Learning Android UI design

Installing Android applications

Developing Android apps

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to list all package names available in the Android environment?

run app.package.info

run app.package.list

run app.provider.query

run app.provider.list

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the '-F' command in the context of package management?

To update a package

To find a specific package

To install a package

To delete a package

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What SQL command is used to gather information from the database?

SELECT * FROM users

UNION ALL SELECT

INSERT INTO users

UPDATE users SET

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information was retrieved from the database using SQL injection?

Network settings

System configurations

Application logs

Usernames and passwords

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the table name from which user data was extracted?

profiles

credentials

users

accounts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What will be covered in the next video according to the conclusion?

Analyzing log files to find books

Developing Android applications

Installing Drozer on Windows

Creating secure databases