1.0.1 / February 25, 2018
(5.0/5) (Learn More</a></div>)
Loading...

Description

In cryptography, SHA-1 (Secure Hash Algorithm 1) is acryptographichash function which takes an input and produces a160-bit (20-byte)hash value known as a message digest - typicallyrendered as ahexadecimal number, 40 digits long. It was designed bythe UnitedStates National Security Agency, and is a U.S. FederalInformationProcessing Standard. Since 2005 SHA-1 has not beenconsideredsecure against well-funded opponents,and since 2010manyorganizations have recommended its replacement by SHA-2 orSHA-3.In 2017 CWI Amsterdam and Google announced they had performedacollision attack against SHA-1, publishing two dissimilar PDFfileswhich produced the same SHA-1 hash. Your task is to finduser'sSHA-1 hash from the application and try to solve the hash andlogininto the application.

App Information Weak Hashing Algorithm SHA-1

  • App Name
    Weak Hashing Algorithm SHA-1
  • Package Name
    hpandro.java.infosec.sha1
  • Updated
    February 25, 2018
  • File Size
    2.5M
  • Requires Android
    Android 4.1 and up
  • Version
    1.0.1
  • Developer
    hpAndro
  • Installs
    50+
  • Price
    Free
  • Category
    Education
  • Developer
  • Google Play Link

hpAndro Show More...

2FA Bypass 1.0 APK
hpAndro
Two-factor authentication (also known as 2FA) is a type (subset)ofmulti-factor authentication. It is a method of confirming auser'sclaimed identity by utilizing a combination of twodifferentfactors: 1) something they know, 2) something they have,or 3)something they are. Mobile-phonetwo-stepauthenticationMobile-phone apps, SMS, and directpushnotifications, etc., are not considered "something you have"andthus are not considered in the multi-factor/two-factorequation.Mobile-phone two-step authentication is more securethansingle-factor password protection but suffers somesecurityconcerns. Phones can be cloned and apps can run on severalphones;cell-phone maintenance personnel can read SMS texts. Notleast,cell phones can be compromised in general, meaning the phoneis nolonger something you and only you have. Your task is to bypassOTPusing different techniques.Yes credentials are admin/admin.
WebSocket Traffic Interception 1.0.1 APK
hpAndro
WebSocket Traffic Interception
SQLi 1.1 APK
hpAndro
Just like web applications, Android applications may usetheuntrusted input to construct SQL queries and do so in a waythat'sexploitable.
SQLite Database 1.0 APK
hpAndro
SQLite is a popular choice as embedded database softwareforlocal/client storage in application software such as webbrowsers.It is arguably the most widely deployed database engine,as it isused today by several widespread browsers, operatingsystems, andembedded systems (such as mobile phones), amongothers.SQLite hasbindings to many programming languages. Manyapplication usesSQLite database for local data stores in to theapplication itself,but in rooted device it will easy to steal thedatabase records.Your task is to find user account and passwordfrom theapplication.
BusyBox Binary Check 1.0 APK
hpAndro
BusyBox Binary Check
Developer Backdoor 2 1.0 APK
hpAndro
Developer Backdoor 2
International Mobile Subscriber Identity (IMSI) 1.0 APK
hpAndro
International Mobile Subscriber Identity (IMSI)
Broadcast Receiver 1.0 APK
hpAndro
Android apps can send or receive broadcast messages from theAndroidsystem and other Android apps, similar to thepublish-subscribedesign pattern. These broadcasts are sent when anevent of interestoccurs.This app working is to send SMS with theprovided mobilenumber and hardcoded caller id.
Loading...