Jump to content

Search the Community

Showing results for tags 'android_htmlfileprovider'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 1 result

  1. Hello everyone, I've been working on a very small project related to Android Operating System and one of the available exploits on metasploit called android_htmlfileprovider. With this simple tool, mixed with just a bit of social engineering, you apparently are able to obtain any files from the victim's android device (only if you already know the file's absolute path on the device). The thing is, even though I'm able to retrieve regular txt files (containing nothing but plain text) I am not able to gather files with extension .db which actually contain sensitive information like browser's passwords, contacts data, etc. I believe this has something to do with special characters included on these .db files. I mean, when opening them with a regular text editor, a lot of special characters can be seen: I'm not completely sure about this, though. I'm also using a rooted AVD (Nexus One) with an old Android Version (2.2) as this exploit will only work with this version (or an older one). I would really apreciate if someone could help me out on this one. Thank you.
×
×
  • Create New...