Mobile Security
Exploiting Insecure Logging: Retrieving Sensitive Data from Android Logcat During Runtime Analysis
Runtime analysis of an Android app revealed sensitive data exposed through Logcat logs. By triggering the native function and monitoring logs, the hidden flag was retrieved.
#reverse-engineering
#android
+3