🦹
CYBERSECURITY BOOK
Ask or search...
Ctrl + K
👽
CS && PEN-TESTING BOOK
📱
Android Security
Mobile Application Pentesting Part 3
Insecure Data Storage
Access the Databases
Copy
sqlite3 <database name>
View Tables
Copy
.tables
View Logs
Copy
adb logcat
Previous
Static Code Analysis
Next
Runtime Security
Last updated
1 year ago
Was this helpful?